{"id":15923,"date":"2023-04-14T10:42:19","date_gmt":"2023-04-14T08:42:19","guid":{"rendered":"https:\/\/www.recharge.com\/blog?p=15923"},"modified":"2025-01-22T16:32:00","modified_gmt":"2025-01-22T15:32:00","slug":"how-can-you-recognise-phishing-emails","status":"publish","type":"post","link":"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails","title":{"rendered":"How can you recognise phishing mails?"},"content":{"rendered":"<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Phishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Everyone can become a target of phishing emails<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Phishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">What is the purpose of phishing emails?<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Phishing emails are usually mails that look like they were sent to you by well-known and reliable companies<\/span><\/p>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">A scam email usually targets the weakest link in computer security: its user&#8230;you. A criminal tries to establish a connection with you through &#8220;personal&#8221; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">What do scam emails look like?<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">As we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let&#8217;s look at some phishing email examples.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2>Double-check your mail<\/h2>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Nearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don&#8217;t be embarrassed to phone the company that (apparently) sent the mail.<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Phishing email examples<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">You can familiarise yourself with often used designs of phishing emails. <a class=\"in-cell-link\" href=\"https:\/\/hooksecurity.co\/phishing-email-examples\" target=\"_blank\" rel=\"noopener\">Here<\/a> you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Who are targeted with phishing mails?<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Of course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It&#8217;s hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who &#8216;bites&#8217;.<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Why is phishing successful?<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Anyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">How can you prevent phishing?<\/span><\/h2>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">With the following tips you can guard yourself better against scam emails:<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Install a trustworthy external spam filter<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">A good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. <a class=\"in-cell-link\" href=\"https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/\" target=\"_blank\" rel=\"noopener\">Here<\/a> you will find a review of popular spam filters.<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Check the scam email sender<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">If you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. <\/span><\/p>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\"><strong>Beware:<\/strong> criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com.<br \/>\n<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Check links before you click<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Be extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.<\/span><\/p>\n<ul>\n<li>\n<h4><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Check the URL of the website<\/span><\/h4>\n<\/li>\n<\/ul>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">All large institutions and banks or the tax authorities have a so-called <a class=\"in-cell-link\" href=\"https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html\" target=\"_blank\" rel=\"noopener\">certified SSL certificate<\/a> in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Keep your money and personal details safe<\/span><\/h2>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">We shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as <a class=\"in-cell-link\" href=\"https:\/\/www.recharge.com\/en-gb\/ie\/neosurf\" target=\"_blank\" rel=\"noopener\">Neosurf<\/a> makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared.<\/span><\/p>\n<div class=\"single-product-container single-product col-lg-12\" >\r\n        <div class=\"col-lg-3 single-product-meta-f\">\r\n        <a class=\"button\" href=\"https:\/\/www.recharge.com\/en-gb\/ie\/neosurf\">\r\n                            <img decoding=\"async\" src=\"https:\/\/creativegroup-blog-prd-eu-west-1-recharge-blog.s3.eu-west-1.amazonaws.com\/blog\/wp-content\/uploads\/2022\/11\/17163356\/neosurf-Card-1024x644%20%281%29.png\" alt=\"neosurf voucher\" \/>\r\n                        Neosurf Voucher        <\/a>\r\n    <\/div>\r\n    <div class=\"single-desc col-lg-9\">\r\n        <p>Buy Neosurf online \u2713 Voucher codes from \u20ac5 to \u20ac100 \u2713 Receive your code instantly by email \u2713 More than 23 safe payment methods<\/p>    <\/div>\r\n<\/div>\r\n\n<p>&nbsp;<\/p>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">With a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world.<\/span><\/p>\n<p><span data-sheets-value=\"{&quot;1&quot;:2,&quot;2&quot;:&quot;&lt;h2&gt;How can you recognise phishing mails?&lt;\/h2&gt;\\n\\nPhishing is a popular type of internet scamming and fraud. Hackers or shrewd crooks fish for valuable information. Criminals try to mislead you with targeted false e-mail messages. Getting their hands on your (bank) account details, login or credit card details is the aim of their game.\\n\\n&lt;h3&gt;Everyone can become a target of phishing emails&lt;\/h3&gt;\\n\\nPhishing emails are hardly distinguishable from legit ones. Internet thieves use well-known institutions such as banks and even the tax authorities to break into your business. Keep in mind that every person or business can become a target. In this blog we aim to give you handy tips with which you can keep yourself from becoming a victim of online phishing.\\n\\n&lt;h3&gt;What is the purpose of phishing emails?&lt;\/h3&gt;\\n\\nPhishing emails are usually mails that look like they were sent to you by well-known and reliable companies. \\n&lt;BR&gt;\\nA scam email usually targets the weakest link in computer security: its user...you. A criminal tries to establish a connection with you through \\&quot;personal\\&quot; contact. Or tries to lure you into their trap with a good story. Phishing or scamming is not only done by e-mail but also by phone, or via messages on social media.\\n\\n&lt;h3&gt;What do scam emails look like?&lt;\/h3&gt;\\n\\nAs we now know, phishing mails are sent by cybercriminals to fish for your data look more and more real. Nowadays, these mails look very polished, complete with logos and sender details. Let's look at some phishing email examples.\\n\\n&lt;h2&gt;Double-check your mail&lt;\/h2&gt;\\n\\nNearly everyone has received a phishing email. Sometimes these emails are notable for obvious errors in the language used. But how can you recognise a phishing mail? If you are not sure if a mail sent to you is legit, don't be embarrassed to phone the company that (apparently) sent the mail. \\n\\n&lt;h3&gt;Phishing email examples&lt;\/h3&gt;\\nYou can familiarise yourself with often used designs of phishing emails. Here you will find some good phishing email examples. Scammers are very creative in their approaches when it comes to online scamming. Looking at some phishing email examples can help you become more aware of their different methods.\\n\\n&lt;h3&gt;Who are targeted with phishing mails?&lt;\/h3&gt;\\n\\nOf course phishing is not only aimed at adults. Children, people who shop online and the elderly (who do not always have much knowledge of this type of scam) can also be targeted. It's hardly ever personal. Criminals simply send out a huge batch of these mails to a number of email addresses to see who 'bites'.\\n\\n&lt;h3&gt;Why is phishing successful?&lt;\/h3&gt;\\n\\nAnyone who has an Internet connection runs the risk of becoming a victim of phishing attacks. Via a phishing mail, cyber criminals try to obtain your login details, credit card details or other sensitive or personal information. With your information they can then withdraw money from your bank account or use your credit card. \\n\\n&lt;h2&gt;How can you prevent phishing?&lt;\/h2&gt;\\nWith the following tips you can guard yourself better against scam emails:\\n&lt;h3&gt;Install a trustworthy external spam filter&lt;\/h3&gt;\\nA good spam filter is an external spam filter that filters your entire domain externally. This is also called an online or hosted spam filter. Here you will find a review of popular spam filters.\\n\\n&lt;h3&gt;Check the scam email sender&lt;\/h3&gt;\\nIf you point your mouse on the sender of an email (or click your right mouse button on the name of the sender), you will often see the full name of the sender, including their e-mail address. This name also tells you the domain name from which the sender sent their message to you. \\n\\n&lt;b&gt;Beware: criminals are increasingly using domain names which look very similar to the real website, such as: wwwbbc.com&lt;\/b&gt;\\n\\n&lt;h3&gt;Check links before you click&lt;\/h3&gt;\\n\\nBe extra vigilant if you are asked to click on a button or on a link in a potential scam email. If someone sends you a link to a funny video or a news page, just search for the content on the official website. The same applies to offers and contact requests.\\n\\n&lt;h3&gt;Check the URL of the website&lt;\/h3&gt;\\n\\nAll large institutions and banks or the tax authorities have a so-called certified SSL certificate in their web address. This means that you will see a green lock in the address bar with the company name behind it. Also, the url always begins with https:\/\/ and never with http:\/\/. So before you enter anything on a website, you should check whether these features are present.\\n\\n&lt;h2&gt;Keep your money and personal details safe&lt;\/h2&gt;\\n\\nWe shop online and often do our banking online. Prevent theft of your money and credit card balance. Do not share your passwords and choose a safe prepaid credit card for shopping or traveling. Using a prepaid credit card such as Neosurf makes it possible to spend money online without entering many private details (and without someone plundering your bank account). When you use a prepaid credit card, no private bank details are shared. \\n&lt;BR&gt;\\nWith a prepaid credit card, you are less vulnerable to online scamming. You decide how much money you put on your prepaid card. The only money that could be lost if you are scammed (or lose your card) is the amount that you put on your card. And you can safely top-up your prepaid credit card anywhere in the world. \\n&lt;BR&gt;\\nFind out more about prepaid credit cards here. Would you like to find out more about phishing? Read our blog &lt;b&gt;here&lt;\/b&gt;LINK TO FUTURE PHISHING BLOG.. \\n&quot;}\" data-sheets-userformat=\"{&quot;2&quot;:1063809,&quot;3&quot;:{&quot;1&quot;:0},&quot;10&quot;:0,&quot;11&quot;:4,&quot;12&quot;:0,&quot;14&quot;:{&quot;1&quot;:2,&quot;2&quot;:0},&quot;15&quot;:&quot;Montserrat&quot;,&quot;16&quot;:12,&quot;23&quot;:1}\" data-sheets-textstyleruns=\"{&quot;1&quot;:0}\uee10{&quot;1&quot;:1949,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:{&quot;2&quot;:{&quot;1&quot;:2,&quot;2&quot;:1136076},&quot;9&quot;:1}}\uee10{&quot;1&quot;:5308}\" data-sheets-hyperlinkruns=\"{&quot;1&quot;:1949,&quot;2&quot;:&quot;https:\/\/hooksecurity.co\/phishing-email-examples&quot;}\uee10{&quot;1&quot;:1953}\uee10{&quot;1&quot;:3222,&quot;2&quot;:&quot;https:\/\/www.comparitech.com\/net-admin\/anti-spam-software\/&quot;}\uee10{&quot;1&quot;:3226}\uee10{&quot;1&quot;:4137,&quot;2&quot;:&quot;https:\/\/uk.norton.com\/internetsecurity-how-to-ssl-certificates-what-consumers-need-to-know.html&quot;}\uee10{&quot;1&quot;:4162}\uee10{&quot;1&quot;:4724,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en-gb\/ie\/neosurf&quot;}\uee10{&quot;1&quot;:4731}\uee10{&quot;1&quot;:5283,&quot;2&quot;:&quot;https:\/\/www.recharge.com\/en\/us\/prepaid-credit-cards&quot;}\uee10{&quot;1&quot;:5308}\">Find out more about prepaid credit cards <a class=\"in-cell-link\" href=\"https:\/\/www.recharge.com\/en-gb\/ie\/prepaid-credit-cards\" target=\"_blank\" rel=\"noopener\">here<\/a>. Would you like to find out more about phishing? Read our blog <a href=\"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/phishing-everything-you-want-to-know\" target=\"_blank\" rel=\"noopener\">here<\/a>.<br \/>\n<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How can you learn to recognise phishing emails and avoid getting scammed online? Read on for useful tips and solutions.<\/p>\n","protected":false},"author":15,"featured_media":15921,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"cos_headline_score":0,"cos_seo_score":0,"cos_headline_text":"How can you recognise phishing mails?","cos_headline_has_been_analyzed":false,"cos_last_analyzed_headline":[],"_hreflang_tags":"","footnotes":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[21],"tags":[323,331],"class_list":["post-15923","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safety-online","tag-awareness","tag-interest"],"jetpack_publicize_connections":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v20.4 (Yoast SEO v21.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How can you recognise phishing emails?<\/title>\n<meta name=\"description\" content=\"How can you learn to recognise phishing emails and avoid getting scammed online? Read on for useful tips and solutions.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How can you recognise phishing mails?\" \/>\n<meta property=\"og:description\" content=\"How can you learn to recognise phishing emails and avoid getting scammed online? Read on for useful tips and solutions.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails\" \/>\n<meta property=\"og:site_name\" content=\"Recharge Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-14T08:42:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-22T15:32:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/creativegroup-blog-prd-eu-west-1-recharge-blog.s3.eu-west-1.amazonaws.com\/blog\/wp-content\/uploads\/2023\/04\/14100853\/How_to_recognize_a_phishing_email_RE.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"6250\" \/>\n\t<meta property=\"og:image:height\" content=\"4162\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Luuk van Roosmalen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails\",\"url\":\"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails\",\"name\":\"How can you recognise phishing emails?\",\"isPartOf\":{\"@id\":\"https:\/\/www.recharge.com\/blog\/en-gb\/#website\"},\"datePublished\":\"2023-04-14T08:42:19+00:00\",\"dateModified\":\"2025-01-22T15:32:00+00:00\",\"author\":{\"@id\":\"https:\/\/www.recharge.com\/blog\/en-gb\/#\/schema\/person\/67dd8d66973d3e7ff921a80cdef5981c\"},\"description\":\"How can you learn to recognise phishing emails and avoid getting scammed online? Read on for useful tips and solutions.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.recharge.com\/blog\/en-gb\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How can you recognise phishing mails?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en-gb\/#website\",\"url\":\"https:\/\/www.recharge.com\/blog\/en-gb\/\",\"name\":\"Recharge Blog\",\"description\":\"Everything about online safety, smart spending &amp; your digital lifestyle.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.recharge.com\/blog\/en-gb\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en-gb\/#\/schema\/person\/67dd8d66973d3e7ff921a80cdef5981c\",\"name\":\"Luuk van Roosmalen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.recharge.com\/blog\/en-gb\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/0484034593c7c90d850635297ede3a99b367e2d479fbe2e95ad2168b76d9aaf1?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/0484034593c7c90d850635297ede3a99b367e2d479fbe2e95ad2168b76d9aaf1?s=96&d=mm&r=g\",\"caption\":\"Luuk van Roosmalen\"},\"url\":\"https:\/\/www.recharge.com\/blog\/en-gb\/author\/luuk-van-roosmalen\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How can you recognise phishing emails?","description":"How can you learn to recognise phishing emails and avoid getting scammed online? Read on for useful tips and solutions.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails","og_locale":"en_GB","og_type":"article","og_title":"How can you recognise phishing mails?","og_description":"How can you learn to recognise phishing emails and avoid getting scammed online? Read on for useful tips and solutions.","og_url":"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails","og_site_name":"Recharge Blog","article_published_time":"2023-04-14T08:42:19+00:00","article_modified_time":"2025-01-22T15:32:00+00:00","og_image":[{"width":6250,"height":4162,"url":"https:\/\/creativegroup-blog-prd-eu-west-1-recharge-blog.s3.eu-west-1.amazonaws.com\/blog\/wp-content\/uploads\/2023\/04\/14100853\/How_to_recognize_a_phishing_email_RE.jpg","type":"image\/jpeg"}],"author":"Luuk van Roosmalen","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails","url":"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails","name":"How can you recognise phishing emails?","isPartOf":{"@id":"https:\/\/www.recharge.com\/blog\/en-gb\/#website"},"datePublished":"2023-04-14T08:42:19+00:00","dateModified":"2025-01-22T15:32:00+00:00","author":{"@id":"https:\/\/www.recharge.com\/blog\/en-gb\/#\/schema\/person\/67dd8d66973d3e7ff921a80cdef5981c"},"description":"How can you learn to recognise phishing emails and avoid getting scammed online? Read on for useful tips and solutions.","breadcrumb":{"@id":"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.recharge.com\/blog\/en-gb\/ie\/how-can-you-recognise-phishing-emails#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.recharge.com\/blog\/en-gb"},{"@type":"ListItem","position":2,"name":"How can you recognise phishing mails?"}]},{"@type":"WebSite","@id":"https:\/\/www.recharge.com\/blog\/en-gb\/#website","url":"https:\/\/www.recharge.com\/blog\/en-gb\/","name":"Recharge Blog","description":"Everything about online safety, smart spending &amp; your digital lifestyle.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.recharge.com\/blog\/en-gb\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.recharge.com\/blog\/en-gb\/#\/schema\/person\/67dd8d66973d3e7ff921a80cdef5981c","name":"Luuk van Roosmalen","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.recharge.com\/blog\/en-gb\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/0484034593c7c90d850635297ede3a99b367e2d479fbe2e95ad2168b76d9aaf1?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/0484034593c7c90d850635297ede3a99b367e2d479fbe2e95ad2168b76d9aaf1?s=96&d=mm&r=g","caption":"Luuk van Roosmalen"},"url":"https:\/\/www.recharge.com\/blog\/en-gb\/author\/luuk-van-roosmalen"}]}},"jetpack_featured_media_url":"https:\/\/creativegroup-blog-prd-eu-west-1-recharge-blog.s3.eu-west-1.amazonaws.com\/blog\/wp-content\/uploads\/2023\/04\/14100853\/How_to_recognize_a_phishing_email_RE.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/posts\/15923","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/comments?post=15923"}],"version-history":[{"count":9,"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/posts\/15923\/revisions"}],"predecessor-version":[{"id":26654,"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/posts\/15923\/revisions\/26654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/media\/15921"}],"wp:attachment":[{"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/media?parent=15923"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/categories?post=15923"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.recharge.com\/blog\/en-gb\/wp-json\/wp\/v2\/tags?post=15923"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}