Fishing: Don’t Get Taken In!

Every day, fraud is perpetrated by unscrupulous individuals. The best way to protect yourself from it is to inform you about the ways these people are reaching you.
Sophie Lamarche
1 June 2013
Omni-Channel Marketing Campaign
2 min
Hameçonnage : ne soyez pas le poisson!

There isn’t a day that goes by without some form of fraud being committed by unscrupulous individuals. The best way to protect yourself is to be aware of the methods dishonest people use to get in touch with you. For example, email phishing is a very widespread practice, with some 260 million fraudulent messages sent each day.

Phishing involves sending messages that appear to be from a trusted company (e.g. bank, government, reputable organization, etc.) in order to get you to divulge your personal information. This information is then used to assume your identity for malicious purposes or to rob you of your belongings.

Usually, these types of messages look quite legitimate in appearance. If they don’t, you should already be on your guard! Here are five other points to consider:

  • The sender’s name and address
    If the sender’s name is not related to the domain name in the sender’s address, it’s a bad sign. For example, if you receive an email from Paypal and the sender’s address is contact@spammersareus.com, it’s probably fake! In general, a legitimate email from Paypal would come from an address such as contact@paypal.com.
  • Grammar
    This may seem strange, but criminals often tend to make spelling or grammatical errors in their messages. People who reply to such messages show that they’re not paying attention and as a result are prime targets to be swindled.
  • URLs
    Before you click on a link in a message (e.g. www.ABCbank.ca/myaccount), place your mouse cursor over the link to verify whether the address displayed matches the link. In addition, check whether any links lead to “.exe” (executable) files, which are notorious for being malware.
  • Threats
    Statements such as “Your account will be closed soon. Click here to reactivate it.” or “A security breach has occurred. Click here to confirm your personal information.” are suspicious. If you’re being pressed to perform a certain action or asked to provide personal information that the company should already have, beware.
  • Attachments
    When was the last time your bank sent you a file as an attachment? Most financial institutions or large companies don’t send attached files. Therefore, if you receive such a message, a phone call to the institution in question could save you a lot of trouble.

The above-mentioned tips are simple things you can do before giving out any personal information. If you suspect that a message is a phishing attempt, it’s best to delete the email without clicking it. If you wish to verify its legitimacy, search for the sender’s telephone number on your own instead of using a number provided in the email. It’s better to take precautions than to be taken in hook, line and sinker!

Find out how your company can benefit from Dialog Insight.

Read also

Security and conformity

Tracking Pixels in Emails: An Ethical Solution Exists

The CNIL seeks to regulate the use of tracking pixels in emails. Between legal obligations, marketing lobbying, and technical solutions like Dialog Insight, find out how to reconcile compliance, performance, and privacy.

Data Management

Explicit Data vs. Implicit Data in Digital Marketing: How to Use Both to Boost Customer Experience

Customer data falls into two main categories: explicit data, voluntarily provided by the user, and implicit data, inferred from their behaviors. Understanding their complementary roles and knowing how to leverage them together makes it possible to personalize the experience, optimize marketing campaigns, and strengthen customer loyalty.

Omni-Channel Marketing Campaign

Email Marketing vs. SMS Marketing: Which One to Choose?

Email marketing or SMS marketing: Which is more effective to reach your customers? Discover the advantages, limitations, and uses of each channel, along with best practices to combine them and maximize your conversions.

Data Management

Convert leads into customers with Lead Scoring

Implementing a lead scoring strategy allows you to place your prospects in their purchase cycle. All this in order to focus your efforts where there is the most chance of conversion.

Data Management

Bill 64: What will change to better protect personal informations

With the tabling last month of the new Bill 64 for a better regulation of personal information, companies must start thinking about its impact on their activities and the seriousness of the project when sanctions will be applied. Here are the essentials to help you better prepare. 

Customer Data Platform

What is Google Postmaster Tools and How Do You Use It?

Discover how Google Postmaster Tools is revolutionizing email marketing by providing key insights to enhance deliverability and engagement. This article explains how it works, its importance to your strategy, and tips for optimizing your campaigns.

New at Dialog Insight

Every message, on the right channel, at the right time — automatically.

What if your campaigns could find on their own the ideal channel and the perfect moment to generate more impact?With Smart Channel and Omnichannel STO, your campaigns become more engaging and more effective: