{"id":1374948,"date":"2023-07-04T12:35:26","date_gmt":"2023-07-04T12:35:26","guid":{"rendered":"https:\/\/www.collaboris.com\/?p=1374948"},"modified":"2023-11-13T15:22:47","modified_gmt":"2023-11-13T15:22:47","slug":"cybersecurity-best-practices-phishing-scams","status":"publish","type":"post","link":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/","title":{"rendered":"Cybersecurity best practices : Phishing scams"},"content":{"rendered":"<h1>Cybersecurity best practices : Phishing scams<\/h1>\n<p><span><img decoding=\"async\" alt=\"image depicting a phishing scam\" data-id=\"1375720\" width=\"1080\" data-init-width=\"2560\" height=\"408\" data-init-height=\"967\" title=\"phishing attempt to get username and password\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/11\/phishing-scaled.jpg\" data-link-wrap=\"true\" data-width=\"1080\" data-height=\"408\" style=\"aspect-ratio: auto 2560 \/ 967;\"><\/span><\/p>\n<p>Phishing scams are fraudulent emails or websites designed to steal sensitive information. In this module, we will discuss how to identify phishing scams and how to avoid falling victim to them. We will also cover best practices for reporting suspicious emails or websites.<\/p>\n<h2 data-block-id=\"block-2847afd6-a40f-4855-bb21-da8aac807714\" style=\"\">How to identify phishing scams<\/h2>\n<p>Phishing scams are becoming increasingly common and sophisticated, making it important to know how to identify them. One way to spot a phishing scam is to look for suspicious or unexpected emails, especially those that ask for personal information or contain urgent requests. Another red flag is when the email contains a generic greeting instead of your name. It&#8217;s also important to check the sender&#8217;s email address and verify that it matches the company or organization they claim to be from. Additionally, be wary of emails that contain attachments or links, as these could lead to malware or fake websites designed to steal your information. By staying vigilant and following these tips, you can help protect yourself from falling victim to a phishing scam.<\/p>\n<h2 data-block-id=\"block-de5da1a0-30fd-4aa8-b964-0ccc10cce159\" style=\"\">How to avoid falling victim to phishing scams<\/h2>\n<p>To avoid falling victim to phishing scams, it is important to be cautious and vigilant when receiving emails or messages from unknown sources. Always verify the sender&#8217;s email address and check for any suspicious links or attachments before clicking on them. Additionally, never share personal information such as passwords or credit card details through email or messages. It is also recommended to use anti-virus software and keep it up-to-date to prevent any potential security breaches. By taking these precautions, you can protect yourself from becoming a victim of phishing scams.<\/p>\n<p>  <span style=\"\"><img decoding=\"async\" alt=\"\" data-id=\"1375149\" width=\"196\" data-init-width=\"847\" height=\"276\" data-init-height=\"1196\" title=\"essential guide to cybersecurity ebook cropped\" loading=\"lazy\" src=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/08\/essential-guide-to-cybersecurity-ebook-cropped.png?_t=1690979525\" data-link-wrap=\"true\" data-width=\"196\" data-height=\"276\" style=\"aspect-ratio: auto 847 \/ 1196;\" ml-d=\"0\" mt-d=\"0\" center-h-d=\"true\" ml-m=\"0\" mt-m=\"0\" ml-t=\"0\" mt-t=\"0\"><\/span><\/p>\n<h3 style=\"color: rgb(52, 52, 52) !important; --tcb-applied-color:#343434 !important;\">Get your free cybersecurity best practices guide<\/h3>\n<p style=\"\">This eBook contains all 10 posts in our cybersecurity series in one handy downloadable guide so you can read it at your leisure.<\/p>\n<p>__CONFIG_colors_palette__{&#8220;active_palette&#8221;:0,&#8221;config&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;name&#8221;:&#8221;Main Accent&#8221;,&#8221;parent&#8221;:-1}},&#8221;gradients&#8221;:[]},&#8221;palettes&#8221;:[{&#8220;name&#8221;:&#8221;Default Palette&#8221;,&#8221;value&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(0, 47, 64)&#8221;}},&#8221;gradients&#8221;:[]},&#8221;original&#8221;:{&#8220;colors&#8221;:{&#8220;8eb49&#8221;:{&#8220;val&#8221;:&#8221;rgb(19, 114, 211)&#8221;,&#8221;hsl&#8221;:{&#8220;h&#8221;:210,&#8221;s&#8221;:0.83,&#8221;l&#8221;:0.45,&#8221;a&#8221;:1}}},&#8221;gradients&#8221;:[]}}]}__CONFIG_colors_palette__ <a href=\"https:\/\/www.collaboris.com\/cybersecurity-guide\/\" target=\"_blank\" rel=\"noopener\"><span style=\"\">    <\/span> <span style=\"\"><span data-tcb_hover_state_parent=\"\" style=\"\">Get y<span style=\"background-color: transparent;\"><\/span>our free eBook<\/span><\/span> <\/a>  <\/p>\n<h2 data-block-id=\"block-6da4766a-6195-4563-8abe-f45b314944d9\" style=\"\">Best practices for reporting suspicious emails or websites<\/h2>\n<p>If you receive an email or come across a website that seems suspicious, it&#8217;s important to report it to the appropriate authorities. This can help prevent others from falling victim to scams or cyber attacks. Some best practices for reporting suspicious emails or websites include forwarding the email to your email provider&#8217;s abuse department, reporting the website to Google&#8217;s Safe Browsing program, and contacting law enforcement if you believe you&#8217;ve been the victim of a crime. Remember to never click on links or download attachments from suspicious emails or websites, as they may contain malware or other harmful content.<\/p>\n<h2 style=\"\">Other posts in this series:<\/h2>\n<p><a href=\"https:\/\/www.collaboris.com\/essential-cybersecurity-guide\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Introduction to cyber security<\/a><\/p>\n<ol>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-password-management\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Password management<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-malware\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Malware<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-engineering\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Social engineering<\/a><\/li>\n<li>Phishing Scams (this post)<\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-social-media-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Social media security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-wifi-network-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Wi-Fi and Network Security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-mobile-device-security\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Mobile device security<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-data-protection-backup\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Data Protection and backup<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-safe-web-browsing\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Safe web browsing<\/a><\/li>\n<li><a href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-incident-reporting\/\" style=\"outline: none;\" target=\"_blank\" data-tcb_hover_state_parent=\"\" rel=\"noopener\">Incident reporting<\/a><\/li>\n<\/ol>\n<h2 style=\"\">You may also like:<\/h2>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">October 17, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/creating-effective-policy\/&quot;,&quot;title&quot;:&quot;Creating an effective policy&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/creating-effective-policy\/\" title=\"Creating an effective policy\" data-css=\"\">Creating an effective policy<\/a><\/span><\/h2>\n<p>Essential information all policies should include When creating an effective policy, it is important <a href=\"https:\/\/www.collaboris.com\/creating-effective-policy\/#more-1375613\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/creating-effective-policy\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">September 25, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/creating-effective-policy\/&quot;,&quot;title&quot;:&quot;Creating an effective policy&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/ai-usage-policy\/\" title=\"The urgency of establishing an AI usage policy\" data-css=\"\">The urgency of establishing an AI usage policy<\/a><\/span><\/h2>\n<p>The urgency of establishing an AI usage policy In an era characterized by rapid <a href=\"https:\/\/www.collaboris.com\/ai-usage-policy\/#more-1375431\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/ai-usage-policy\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">September 15, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/creating-effective-policy\/&quot;,&quot;title&quot;:&quot;Creating an effective policy&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/mastering-compliance-culture-guide\/\" title=\"Practical guide on mastering compliance culture\" data-css=\"\">Practical guide on mastering compliance culture<\/a><\/span><\/h2>\n<p>Practical guide on mastering compliance culture Employee compliance is essential for maintaining organizational integrity, <a href=\"https:\/\/www.collaboris.com\/mastering-compliance-culture-guide\/#more-1375388\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/mastering-compliance-culture-guide\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">August 17, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/creating-effective-policy\/&quot;,&quot;title&quot;:&quot;Creating an effective policy&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/increasing-employee-engagement-in-policy-management\/\" title=\"Increasing Employee Engagement in Policy Management (part 2)\" data-css=\"\">Increasing Employee Engagement in Policy Management (part 2)<\/a><\/span><\/h2>\n<p>Increasing Employee Engagement in Policy Management (part 2)Part one of this post covered the <a href=\"https:\/\/www.collaboris.com\/increasing-employee-engagement-in-policy-management\/#more-1375228\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/increasing-employee-engagement-in-policy-management\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">August 17, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/creating-effective-policy\/&quot;,&quot;title&quot;:&quot;Creating an effective policy&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/increase-employee-engagement-policy-management\/\" title=\"How to Increase Employee Engagement in Policy Management\" data-css=\"\">How to Increase Employee Engagement in Policy Management<\/a><\/span><\/h2>\n<p>How to Increase Employee Engagement in Policy Management (part 1)The Connection between Employee Engagement <a href=\"https:\/\/www.collaboris.com\/increase-employee-engagement-policy-management\/#more-1375223\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/increase-employee-engagement-policy-management\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n<p style=\"font-size: var(--tve-font-size, 13px);\"><span data-shortcode=\"tcb_post_published_date\" data-shortcode-name=\"Post date\" data-extra_key=\"\" data-attr-type=\"published\" data-attr-date-format-select=\"F j, Y\" data-attr-date-format=\"F j, Y\" data-attr-show-time=\"0\" data-attr-time-format-select=\"g:i a\" data-attr-time-format=\"\" data-attr-link=\"0\" data-attr-target=\"1\" data-attr-rel=\"0\" data-option-inline=\"1\">August 10, 2023 <\/span><\/p>\n<h2 style=\"\"><span data-shortcode=\"tcb_post_title\" data-shortcode-name=\"Post title\" data-extra_key=\"\" data-attr-link=\"1\" data-attr-target=\"0\" data-attr-rel=\"0\" data-option-inline=\"1\" data-attr-static-link=\"{&quot;className&quot;:&quot;&quot;,&quot;href&quot;:&quot;https:\/\/www.collaboris.com\/creating-effective-policy\/&quot;,&quot;title&quot;:&quot;Creating an effective policy&quot;,&quot;class&quot;:&quot;&quot;}\" data-attr-css=\"\"><a href=\"https:\/\/www.collaboris.com\/building-ownership-accountability\/\" title=\"Building Ownership and Accountability\" data-css=\"\">Building Ownership and Accountability<\/a><\/span><\/h2>\n<p>Policies and Procedures &#8211; Building Ownership and Accountability Strategies for Encouraging Employees to Take <a href=\"https:\/\/www.collaboris.com\/building-ownership-accountability\/#more-1375240\">&#8230;<\/a><\/p>\n<p><a href=\"https:\/\/www.collaboris.com\/building-ownership-accountability\/\"><span><span>Read More<\/span><\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity best practices : Phishing scams Phishing scams are fraudulent emails or websites designed to steal sensitive information. In this module, we will discuss how to identify phishing scams and how to avoid falling victim to them. We will also cover best practices for reporting suspicious emails or websites. How to identify phishing scams Phishing [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":2109,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"no","_lmt_disable":"","footnotes":""},"categories":[6],"tags":[],"class_list":["post-1374948","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-policy-management"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v26.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity best practices : Phishing scams<\/title>\n<meta name=\"description\" content=\"Phishing scams are fraudulent emails or websites designed to steal sensitive information. In this module, we will discuss how to identify phishing scams and how to avoid falling victim to them. We will also cover best practices for reporting suspicious emails or websites.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity best practices : Phishing scams\" \/>\n<meta property=\"og:description\" content=\"Phishing scams are fraudulent emails or websites designed to steal sensitive information. In this module, we will discuss how to identify phishing scams and how to avoid falling victim to them. We will also cover best practices for reporting suspicious emails or websites\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"Collaboris\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Collaboris\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-04T12:35:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-13T15:22:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/cyber-security-phishing.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Helen Jones\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@helen.jones@collaboris.co.uk\" \/>\n<meta name=\"twitter:site\" content=\"@Collaboris\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Helen Jones\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\"},\"author\":{\"name\":\"Helen Jones\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\"},\"headline\":\"Cybersecurity best practices : Phishing scams\",\"datePublished\":\"2023-07-04T12:35:26+00:00\",\"dateModified\":\"2023-11-13T15:22:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\"},\"wordCount\":646,\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"articleSection\":[\"Policy Management\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\",\"url\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\",\"name\":\"Cybersecurity best practices : Phishing scams\",\"isPartOf\":{\"@id\":\"https:\/\/www.collaboris.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"datePublished\":\"2023-07-04T12:35:26+00:00\",\"dateModified\":\"2023-11-13T15:22:47+00:00\",\"description\":\"Phishing scams are fraudulent emails or websites designed to steal sensitive information. In this module, we will discuss how to identify phishing scams and how to avoid falling victim to them. We will also cover best practices for reporting suspicious emails or websites.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#primaryimage\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg\",\"width\":820,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.collaboris.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity best practices : Phishing scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.collaboris.com\/#website\",\"url\":\"https:\/\/www.collaboris.com\/\",\"name\":\"Collaboris\",\"description\":\"We make compliance simple\",\"publisher\":{\"@id\":\"https:\/\/www.collaboris.com\/#organization\"},\"alternateName\":\"DocRead\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.collaboris.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.collaboris.com\/#organization\",\"name\":\"Collaboris\",\"alternateName\":\"DocRead\",\"url\":\"https:\/\/www.collaboris.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"contentUrl\":\"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png\",\"width\":150,\"height\":40,\"caption\":\"Collaboris\"},\"image\":{\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Collaboris\/\",\"https:\/\/x.com\/Collaboris\",\"https:\/\/www.linkedin.com\/company\/collaboris\"],\"description\":\"Collaboris is a Software company that created a policy management tool called DocRead.\",\"email\":\"info@collaboris.com\",\"telephone\":\"02079935140\",\"legalName\":\"Collaboris Ltd\",\"foundingDate\":\"2007-12-03\",\"vatID\":\"GB928895360\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"1\",\"maxValue\":\"10\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef\",\"name\":\"Helen Jones\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g\",\"caption\":\"Helen Jones\"},\"sameAs\":[\"https:\/\/x.com\/helen.jones@collaboris.co.uk\"],\"url\":\"https:\/\/www.collaboris.com\/author\/helen-jones\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Cybersecurity best practices : Phishing scams","description":"Phishing scams are fraudulent emails or websites designed to steal sensitive information. In this module, we will discuss how to identify phishing scams and how to avoid falling victim to them. We will also cover best practices for reporting suspicious emails or websites.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/","og_locale":"en_GB","og_type":"article","og_title":"Cybersecurity best practices : Phishing scams","og_description":"Phishing scams are fraudulent emails or websites designed to steal sensitive information. In this module, we will discuss how to identify phishing scams and how to avoid falling victim to them. We will also cover best practices for reporting suspicious emails or websites","og_url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/","og_site_name":"Collaboris","article_publisher":"https:\/\/www.facebook.com\/Collaboris\/","article_published_time":"2023-07-04T12:35:26+00:00","article_modified_time":"2023-11-13T15:22:47+00:00","og_image":[{"url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2023\/07\/cyber-security-phishing.jpg","width":1024,"height":425,"type":"image\/jpeg"}],"author":"Helen Jones","twitter_card":"summary_large_image","twitter_creator":"@helen.jones@collaboris.co.uk","twitter_site":"@Collaboris","twitter_misc":{"Written by":"Helen Jones","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#article","isPartOf":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/"},"author":{"name":"Helen Jones","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef"},"headline":"Cybersecurity best practices : Phishing scams","datePublished":"2023-07-04T12:35:26+00:00","dateModified":"2023-11-13T15:22:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/"},"wordCount":646,"publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","articleSection":["Policy Management"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/","url":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/","name":"Cybersecurity best practices : Phishing scams","isPartOf":{"@id":"https:\/\/www.collaboris.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#primaryimage"},"image":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","datePublished":"2023-07-04T12:35:26+00:00","dateModified":"2023-11-13T15:22:47+00:00","description":"Phishing scams are fraudulent emails or websites designed to steal sensitive information. In this module, we will discuss how to identify phishing scams and how to avoid falling victim to them. We will also cover best practices for reporting suspicious emails or websites.","breadcrumb":{"@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#primaryimage","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2016\/07\/blue_820x300_policymanagement_img.jpg","width":820,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.collaboris.com\/cybersecurity-best-practices-phishing-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.collaboris.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity best practices : Phishing scams"}]},{"@type":"WebSite","@id":"https:\/\/www.collaboris.com\/#website","url":"https:\/\/www.collaboris.com\/","name":"Collaboris","description":"We make compliance simple","publisher":{"@id":"https:\/\/www.collaboris.com\/#organization"},"alternateName":"DocRead","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.collaboris.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.collaboris.com\/#organization","name":"Collaboris","alternateName":"DocRead","url":"https:\/\/www.collaboris.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","contentUrl":"https:\/\/www.collaboris.com\/wp-content\/uploads\/2021\/05\/collaboris_logo_small.png","width":150,"height":40,"caption":"Collaboris"},"image":{"@id":"https:\/\/www.collaboris.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Collaboris\/","https:\/\/x.com\/Collaboris","https:\/\/www.linkedin.com\/company\/collaboris"],"description":"Collaboris is a Software company that created a policy management tool called DocRead.","email":"info@collaboris.com","telephone":"02079935140","legalName":"Collaboris Ltd","foundingDate":"2007-12-03","vatID":"GB928895360","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"1","maxValue":"10"}},{"@type":"Person","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/df8a602d5db57fce86940a1aa6385aef","name":"Helen Jones","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.collaboris.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cb6011a4dfb291a2bb0e30fb70581537bb77c6e70a1c8e887e16ae98fc5b518d?s=96&d=mm&r=g","caption":"Helen Jones"},"sameAs":["https:\/\/x.com\/helen.jones@collaboris.co.uk"],"url":"https:\/\/www.collaboris.com\/author\/helen-jones\/"}]}},"modified_by":"Helen Jones","_links":{"self":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/comments?post=1374948"}],"version-history":[{"count":18,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374948\/revisions"}],"predecessor-version":[{"id":1375722,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/posts\/1374948\/revisions\/1375722"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media\/2109"}],"wp:attachment":[{"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/media?parent=1374948"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/categories?post=1374948"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.collaboris.com\/wp-json\/wp\/v2\/tags?post=1374948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}