1. Check the sender: Cybercriminals often impersonate identities of people who are trusted by the User, so they can either put an alias (First Name, Last Name) to a totally unknown email address, or they can create an address very similar to the original sender by changing one letter (such as “t” for “i”).
2. Pay attention to obvious spelling, context, content or design errors.: We can all make mistakes when writing, however, in the case of phishing attacks (by e-mail) it is very common for cybercriminals to use automatic translators to translate certain phrases without any sense. In addition, if the attack is launched using the name of a known sender (boss, family member, friend, etc.), we can recognize errors in the way that person usually writes. It is also very common for cybercriminals to make errors in the formatting or design of the e-mail, for example, the use of old company logos, incorrect email footer signatures, meaningless links, etc.
3. If something is urgently demanded of you, be alert: This does not mean that all e-mails we receive, for example, from a family member, a customer/supplier or a manager should be omitted because they are short and urgent. But we should be suspicious the moment the subject matter, the request itself or even the information we are urgently required to provide does not fit. Especially if you are instructed to enter a form, click on a link or if we know the sender, but do not have such a direct relationship with him/her. To find out, the best thing to do is to contact that person or entity by other means (official telephone).
4. Check the links without clicking directly: The most common thing is that if they are very long links, with signs and symbols and not clear words, it is recommended to be cautious. However, the apparently correct links may also have been tampered with. One option for checking is to leave the mouse cursor over the link, until a box appears with the real link, and we can see if they match or on the contrary we should alert of a possible Phishing attempt.
IMPORTANT NOTE: We remind you again that if you have the slightest suspicion about a communication or believe that you may have been the victim of a cyberattack, do not hesitate to inform your line manager, the CISO Security Manager and the IT department, so that they can advise you appropriately. And on a personal level he reports the cyberattack to the police authority.
*Shipment date: July 21, 2025

