Tips to Protect Yourself From Phishing Scams (2024)

  • Official websites use .mass.gov

    A .mass.gov website belongs to an official government organization in Massachusetts.

  • Secure websites use HTTPS certificate

    A lock icon ( ) or https:// means you’ve safely connected to the official website. Share sensitive information only on official, secure websites.

Skip to main content

Mass.gov

Mass Consumer Affairs Blog

Tips to Protect Yourself From Phishing Scams (3)

Blog Post

4/01/2022

  • Office of Consumer Affairs and Business Regulation
Tips to Protect Yourself From Phishing Scams (4)

As technology continues to advance, identity thieves are also becoming more clever. Scammers are constantly developing new, nearly undetected, tactics to trick their targets. The most common way consumers are defrauded online is through phishing. The Federal Bureau of Investigation’s Internet Crime Complaint Center recorded over twice as many incidents of phishing than any other type of cyber-crime in 2020.

What is phishing?

Phishing is when a scammer sends a fraudulent email pretending to be a legitimate entity in an attempt to access the recipient’s personal identifying information. Once a fraudster obtains these private details, which can be anything from account passwords to Social Security numbers or credit card information, he or she will try various methods to access online accounts and finances.

The most common phishing attack happens via email, but there are different techniques scammers may use depending on their target. Some phishing efforts can occur by phone calls or text messages, these types of scams are called vishing (voice phishing), or smishing (SMS phishing). The term “whaling” is used when the target of a phishing campaign is an organization’s president or senior executive. No matter what the type of phishing, the main goal of this type of fraud is always to convince an individual to provide sensitive information that will later be used illegally.

How to spot a phishing scam:

The most successful phishing emails are carefully constructed to look identical to messages received by well-known companies or senders. These messages are often difficult to distinguish from real emails. Keep an eye out for these red flags when scanning your inbox for phishing scams:

  • Attractive, “To-Good-To-Be-True” Offers:If an email is promising you something too good to be true, it probably is. These attractive offers are designed to immediately grab your attention and detract from other details within the message. If you are offered a large sum of money, a new phone, vacation, car, or other prizes, verify the sender or just ignore the message.
  • False Sense of Urgency:If an email demands that you act quickly, or presents a limited-time opportunity that failure to claim will result in a severe, negative action, take your time to read and understand the message. A reputable organization, including government entities, will not contact you via email threatening a consequence if you do not comply with the message guidelines. Call the sender’s business directly to discuss the email message using a verifiable phone number, never reply to these emails or use the contact information within the message.
  • Fake Hyperlinks:If an email looks suspicious, ensure that any websites or links provided are going to a safe website. Or skip slicking on email links completely and visit the entity’s website you are familiar with. A common tactic used by phishing scammers is link manipulation where a malicious hyperlink is inserted to look like it belongs to the organization sending the email. Often these fake URLs will be misspelled to deceive you. Other times, the fake link will be disguised as a text box, asking you to “Click Here.” Make sure to hover over the text box to view the actual web address.
  • Corrupt Attachments:If you received an attachment from a questionable email, do not open it without first confirming the documents with the sender. Similar to hyperlinks, attachments in phishing emails usually contain malicious viruses or ransomware.

Avoid phishing scams:

While scam tactics and technology are always updating, there are some simple proactive steps you can take to stay safe from phishing. Consider these steps to help you spot phishing attempts:

  • Add spam filters to your email.
  • Never email personal or financial information without proper security protocols.
  • Do not respond to messages seeking personal information via email.
  • Call the sender directly to verify if a message you received is legitimate.
  • Check that the website you are visiting is secure. Look for a lock icon or an address that begins with “https:” indicating that the site is secure.

If you have reason to believe you are involved in a phishing scam, the Office of Consumer Affairs and Business Regulation (OCABR) hasresources to help victims of identity theft. For more information or resources related to scams and identity theft, you may contact the OCABR Consumer Hotline at 617-973-8787, Monday through Friday between the hours of 9:00 am and 4:30 pm.

  • Tips to Protect Yourself From Phishing Scams (5)

    The Office of Consumer Affairs and Business Regulation protects and empowers consumers through advocacy and education, and ensures a fair playing field for the Massachusetts businesses its agencies regulate.

  • Help Us Improve Mass.gov with your feedback

    Thank you for your website feedback! We will use this information to improve this page.

    If you would like to continue helping us improve Mass.gov, join our user panel to test new features for the site.

    Feedback

    Tips to Protect Yourself From Phishing Scams (2024)

    FAQs

    Tips to Protect Yourself From Phishing Scams? ›

    Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the Internet. Emails and Internet pages created by phishers may look exactly like the real thing. They may even have a fake padlock icon that ordinarily is used to denote a secure site.

    How can you protect yourself from phishing and scams? ›

    Four Ways To Protect Yourself From Phishing
    1. Protect your computer by using security software. ...
    2. Protect your cell phone by setting software to update automatically. ...
    3. Protect your accounts by using multi-factor authentication. ...
    4. Protect your data by backing it up.

    How to avoid phishing scams? ›

    Never provide your personal information in response to an unsolicited request, whether it is over the phone or over the Internet. Emails and Internet pages created by phishers may look exactly like the real thing. They may even have a fake padlock icon that ordinarily is used to denote a secure site.

    What is the best Defence against phishing? ›

    Education and awareness

    The greatest defence against phishing comes from arming your people with a solid understanding of what potential attacks look like. Make sure everyone in your organisation considers the sender's email address and makes sure it's genuine, since some clone emails can look very convincing.

    What is the first line of Defence against phishing attacks? ›

    Do not provide sensitive personal information (like usernames and passwords) over email. Watch for email senders that use suspicious or misleading domain names. Inspect URLs carefully by hovering over them to make sure they're legitimate and not imposter sites.

    What is the best defense against phishing and other social engineering attacks? ›

    Keep software and firmware regularly updated, particularly security patches. Don't run your phone rooted, or your network or PC in administrator mode. Even if a social engineering attack gets your user password for your 'user' account, it won't let them reconfigure your system or install software on it.

    What is the single best defense against cybercrime? ›

    Use anti-virus software and keep it updated

    Using anti-virus or a comprehensive internet security solution like Kaspersky Premiumis a smart way to protect your system from attacks. Anti-virus software allows you to scan, detect and remove threats before they become a problem.

    Top Articles
    Latest Posts
    Article information

    Author: Allyn Kozey

    Last Updated:

    Views: 5959

    Rating: 4.2 / 5 (43 voted)

    Reviews: 82% of readers found this page helpful

    Author information

    Name: Allyn Kozey

    Birthday: 1993-12-21

    Address: Suite 454 40343 Larson Union, Port Melia, TX 16164

    Phone: +2456904400762

    Job: Investor Administrator

    Hobby: Sketching, Puzzles, Pet, Mountaineering, Skydiving, Dowsing, Sports

    Introduction: My name is Allyn Kozey, I am a outstanding, colorful, adventurous, encouraging, zealous, tender, helpful person who loves writing and wants to share my knowledge and understanding with you.