We are independent & ad-supported. We may earn a commission for purchases made through our links.

Advertiser Disclosure

Our website is an independent, advertising-supported platform. We provide our content free of charge to our readers, and to keep it that way, we rely on revenue generated through advertisements and affiliate partnerships. This means that when you click on certain links on our site and make a purchase, we may earn a commission. Learn more.

How We Make Money

We sustain our operations through affiliate commissions and advertising. If you click on an affiliate link and make a purchase, we may receive a commission from the merchant at no additional cost to you. We also display advertisements on our website, which help generate revenue to support our work and keep our content free for readers. Our editorial team operates independently from our advertising and affiliate partnerships to ensure that our content remains unbiased and focused on providing you with the best information and recommendations based on thorough research and honest evaluations. To remain transparent, we’ve provided a list of our current affiliate partners here.

What are Phishing Protection Tips?

Mary Elizabeth
By
Updated May 16, 2024
Our promise to you
EasyTechJunkie is dedicated to creating trustworthy, high-quality content that always prioritizes transparency, integrity, and inclusivity above all else. Our ensure that our content creation and review process includes rigorous fact-checking, evidence-based, and continual updates to ensure accuracy and reliability.

Our Promise to you

Founded in 2002, our company has been a trusted resource for readers seeking informative and engaging content. Our dedication to quality remains unwavering—and will never change. We follow a strict editorial policy, ensuring that our content is authored by highly qualified professionals and edited by subject matter experts. This guarantees that everything we publish is objective, accurate, and trustworthy.

Over the years, we've refined our approach to cover a wide range of topics, providing readers with reliable and practical advice to enhance their knowledge and skills. That's why millions of readers turn to us each year. Join us in celebrating the joy of learning, guided by standards you can trust.

Editorial Standards

At EasyTechJunkie, we are committed to creating content that you can trust. Our editorial process is designed to ensure that every piece of content we publish is accurate, reliable, and informative.

Our team of experienced writers and editors follows a strict set of guidelines to ensure the highest quality content. We conduct thorough research, fact-check all information, and rely on credible sources to back up our claims. Our content is reviewed by subject matter experts to ensure accuracy and clarity.

We believe in transparency and maintain editorial independence from our advertisers. Our team does not receive direct compensation from advertisers, allowing us to create unbiased content that prioritizes your interests.

In phishing scams, the scammer uses a lure or bait, often in the form of an email but also possibly in other ways, to try to “catch” a gullible person and trick him or her into revealing personal information. The information sought is often a user name and password, a credit card number, or a Social Security number, and the intent is generally profit or identity theft. Phishing protection refers to the steps one can take to protect oneself from phishing scams.

Phishing protection includes being aware of the ways in which a phishing attack can be launched. Besides email, phishing can be attempted in a text message, a social networking post, a website link, a chat room, a message board, and fakes in the forms of banner ads, job search sites, and browser toolbars. It’s also important to be aware of what’s in the address field of the browser on two counts. One is to check for https:// rather than http:// when using a secure site. The other is to check the favicon if you use the Firefox® browser: the favicon on secure sites is large and green as a signal that the site has a valid SSL (Secure Sockets Layer) certificate, and this is verified by clicking on the favicon. In addition, both the Firefox® and Microsoft® Internet Explorer® 8 browsers are programmed to alert users to potentially dangerous websites and use a padlock symbol to designate safe sites.

Phishing protection also includes strategies for handling suspicious email. One should never send personal information through unprotected email, and no upstanding business will ever ask for information this way. In addition, one should not click on email links or fill out email forms as a general rule, especially when an email carries an implied or explicit threat about what will happen if you don’t supply the information. Upon receiving a suspicious email that purports to be from a business, it’s a good idea to read carefully for typos, misspellings, and non-standard usages, any of which can tip you off to a phishing attempt, and make contact with the purported sender by phone as a way of checking validity. Keep in mind that spear phishing may use the name of a colleague or trusted person within an organization, so don’t rely on the ‘From’ indication to determine whether an email is safe.

Spam protection, as well as anti-virus and anti-malware software are also useful approaches to phishing protection. A firewall on one’s computer and/or router is also helpful. Finally, reporting phishing attempts to the organization that was being imitated and your ISP (internet service provider) is a good way to help prevent future phishing attacks.

EasyTechJunkie is dedicated to providing accurate and trustworthy information. We carefully select reputable sources and employ a rigorous fact-checking process to maintain the highest standards. To learn more about our commitment to accuracy, read our editorial process.
Mary Elizabeth
By Mary Elizabeth
Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the Internet. In addition to writing articles on art, literature, and music for EasyTechJunkie, Mary works as a teacher, composer, and author who has written books, study guides, and teaching materials. Mary has also created music composition content for Sibelius Software. She earned her B.A. from University of Chicago's writing program and an M.A. from the University of Vermont.

Discussion Comments

Mary Elizabeth

Mary Elizabeth

Passionate about reading, writing, and research, Mary Elizabeth is dedicated to correcting misinformation on the Internet. In addition to writing articles on art, literature, and music for EasyTechJunkie, Mary works as a teacher, composer, and author who has written books, study guides, and teaching materials. Mary has also created music composition content for Sibelius Software. She earned her B.A. from University of Chicago's writing program and an M.A. from the University of Vermont.
EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.

EasyTechJunkie, in your inbox

Our latest articles, guides, and more, delivered daily.