How to Spot a Phishing Email

Phishing emails are a common way for online scammers to gain personal information or money.

They are effective because many people don’t understand what a phishing email is or how to spot a scam.

In this article, we’re looking at what you should watch out for so you don’t become a victim to these attacks. 


What is a Phishing Email


Phishing is a form of scam used to elicit personal information, steal money or install viruses onto your device. A phishing email is designed to imitate an email from a real person or company e.g. a bank or delivery company. 

Most phishing emails are made to sound urgent, asking you to click a link and enter information (such as a password or card details) or make a payment. If you follow the instructions, the scammers then have your information or money and can use it to their advantage.

How to Spot a Phishing email


Although some phishing emails can look super realistic at first, there are usually ways to identify if the message you’ve received isn’t legit. Let’s take a look at what you should be looking out for when trying to spot a phishing email.

Are you expecting this?

Your first thoughts when receiving an email is whether you’re expecting it. Usually, when you are expecting an email from a certain someone or business, the message you’ll receive will be real. But, if you receive an email from someone, for example your bank, when you aren’t expecting this, be extra cautious when looking at it.

It’s also obvious that the email is fake when it’s from a business that you don’t interact with e.g. when you receive an email from NatWest bank but you use Barclays.

Sender Information

The first way to tell if the email is an attempted phishing attack is by looking at the user who sent it. Look out for grammar mistakes like misspelled words or a number replacing a letter e.g. the number “1” being used as the letter “i”. In this example, we have an email from “Lloyds TSB”. Looking at the sender address, you’ll see they’ve used the letter “L” instead of an “i” in the ‘authentication’ part. Without paying attention, anyone would think the sender of this email was the real Lloyds bank.

Look out for Links

A key part to look out for when identifying a phishing email is if there are any links.

If the email includes a button link, you can hover over the button and you’ll be able to see the full link and where you’ll be taken to if you were to click it. Similar to the sender information, a link may include switched characters or grammar mistakes, for example, a fake link to sign into Microsoft may be, with the number “1” being used instead of the letter “i”.

However, some links might not be like this and will be completely random with nothing to do with the “business” that has sent you the email. These types of links should also indicate that the email is a phish.

Here we have a fake NatWest email for example. The first thing you can see is that the link starts with http and not https, meaning, the link is not secure. Another thing to notice is that this link compared to the legit NatWest online banking link is very different. Even if the link looks convincing, do not click it. It’s much better and safer to search for NatWest online yourself and log in that way. 

Overall Layout

The first thing you will probably notice about the email is the layout and how it looks. If it’s a poorly designed email with text all over the place, it’s more likely a phishing email. However, with a good layout, these emails can be disguised as a real one.

In this example, we have a phishing email from a fake Netflix. The first thing to notice is the logo and the fact it’s missing a letter. This is an instant red flag. 

Another thing to note is how the email doesn’t address you. The email opens by saying hi. Usually when a trustworthy company contacts you, they include your name at the start of the email. 

Overall, the layout of this email isn’t the best. If you were expecting an email from Netflix, you would think it would look a bit more well built (and of course using the correct name and logo).

What happens if I open a phishing email?


There’s no need to worry if you open a phishing email. You just need to make sure that no links are clicked on and no information has been given. Clicking a button or link won’t always take you to a fake sign in page and could potentially install a virus onto your device instead, so it’s crucial that you are aware of phishing emails from the moment you receive them.


In depth look into phishing emails


If you’re still worried about getting caught out by phishing emails, take a look at this video, where we take a more in depth look at some more phishing examples. 


Are there other Phishing types other than emails?


Yes. Not only can you potentially get caught out by phishing emails, but you must also be aware of the other types of phishing scams. Some of the more common techniques include:


SMS Phishing

As well as phishing attacks via email, you also need to look out for phishes being sent by text/sms. Along side emails, SMS phishing is very common and is as successful for scammers.

You might receive a message similar to the examples above, where a bank messages you or more recently, messages from the “NHS” regarding covid tests or vaccines.

If you receive a text message from any unknown number, which wants you to click a link and enter details, you should ignore to avoid any scams. 

WiFi Hotspots

Known as ‘Evil Twin’, Scammers create fake WiFi networks and often make them look legitimate. So when you’re out and about and want to connect to a public connection, you need to make sure what you’re connecting to is secure.

An example of an evil twin would be a free WiFi point in a Starbucks Coffee shop. You might think that what you’re connecting to is Starbucks’ WiFi connection, however, be aware that the connection is legit and not create by a scammer.

Ways to check is if the network requires a password. (Majority of public WiFi points don’t require a password to connect). You can also avoid these scams by simply using your mobile data if possible.

Pop ups

You’ve won a new iPhone!

I bet you’ve seen this message pop up before when you’re browsing the web. This in fact would be a phishing attack. Usually, if you see a pop up telling you you’ve won a competition or it’s too good to be true, it’ll be a phish.

These might appear on random websites either along the side of the page or might just pop up and cover the entire screen. Either way, you should avoid these.

HTTPS Phishing

HTTPS is considered a safe link to click because it uses encryption to increase security. However, many scammers creates fake replicas of websites and impersonate companies.

Make sure that if you find a link in any message, that the link begins with HTTPS. If there is no ‘S’ and the link begins with HTTP, it means the link isn’t secure, and potentially is a scam.

How to recognise a phishing email every single time


After reading through those previous tips, you should now have a greater knowledge about phishing emails. However, you might be thinking, “how can I notice a phishing email every single time?”

Inlcluded in Reformed IT’s support package, our clients receive the best cyber security training. This means the whole business can learn everything there is to defend against scams, including phishing emails.

If this is something you think your business could benefit from, give us a call on 01158 244 824 or email us using the button below. 

Interested in what else our IT Support package includes?

There are many reasons that IT support with Reformed IT is a great choice for your business or organisation. If you choose Reformed IT for your IT support, you'll receive all these benefits including help from members of our experienced team when needed.

Unlimited IT Support

We provide fully inclusive, onsite and remote IT support. In addition to that, it won't cost you extra for an engineer to attend your site to resolve a technical issue.

Device Status Monitoring

When we take on your IT support, we deploy our monitoring agent onto all devices and servers. This alerts us to any issues which you may be unaware of.

Data Breach Monitoring

There are over 8 billion breached passwords and personal information available on the dark web. There's a possibility that some of this data relates to your employees. We'll monitor dark web activity and provide reports of breached passwords.

Cyber Essentials Certification

We ensure every one of our clients achieve their Cyber Essentials certification at no additional cost. We also help them towards Cyber Essentials Plus ensuring that everything is ready for assessment.

Office 365 Monitoring

We monitor your Microsoft 365 tenancy with our 24/7 security operations centre. If there is strange activity we'll find it immediately  and alert you or resolve the issue straight away. Keeping your business secure.

Anti-Virus Software

Everyone wants to avoid computer viruses. We include anti-virus software as part of our IT support package to keep your devices safe and to save time when it comes to viruses.

Email Security

Over 90% of cyber attacks start with a phishing email. It's crucial that your business has the best defence against cyber criminals and scams when regarding your mailbox.

Backups for Office 365

We will ensure that all of your emails and files are backed up, at no extra cost. We recognise the importance of backups and disaster recovery so we feel it shouldn't be an added extra.

Managed Email Signatures

With our included Exclaimer signatures for Office 365 service, you can get more out of your email signatures instead of a simple message with no images.

Cyber Security Training

To keep you even safer from hackers, we provide globally recognised and market leading Cyber security training by PhishingTackle. This online training portal will provide your teams with guidance and information to reduce the risk of hackers and scams.

Asset and Warranty Tracking & Reporting

We provide you with a list of your current assets in the business by using our powerful remote management tools. This creates a monthly asset report so you can keep track of your hardware life cycles.

Reformed IT Academy

We'll provide your business with the best IT training and learning sources. With the Reformed IT Academy, you’ll be able to watch and complete over 700 courses to help grow your knowledge and skills.

Password Manager

Password managers make storing and creating passwords much easier and safer. Keeper password manager also auto-fills passwords making the sign in proccess much quicker.

Cyber Threat Monitoring

With Huntress, you'll have an extra layer of security to help keep hackers out of your business. You'll be able to Monitor cyber attacks and malicious activity.

5.0 97 reviews

  • Avatar Nathan W. ★★★★★ 3 months ago
    Reformed IT have been beyond brilliant with helping us improve our current IT infrastructure and security. The services that they provide has taken enormous pressure off our internal … More IT team. They are always keen on sharing their knowledge and skills and always go above and beyond. I can’t recommend them highly enough.
  • Avatar Lisa S. ★★★★★ 3 months ago
    Absolutely brilliant service! Friendly, knowledgeable and really helpful without making me feel stupid for not understanding IT wizardry!
  • Avatar Debbie D. ★★★★★ 6 months ago
    Great service so far what with me being a new starter, & I've heard really positive things about Reformed IT from many of my colleagues, so I have no doubt this great service … More will continue!
  • Avatar Chloe J. ★★★★★ 9 months ago
    Reformed IT always provide excellent service and support. Since working for Walton and Allen the team have always been fast to resolve any IT issues I have had. Thank you for all of … More your help 🙂