Cybercriminals often target individuals by impersonating suppliers or other transactional contacts to receive payments. They may even impersonate someone you know or trust. While their emails may appear convincing at first glance, be vigilant for bad grammar, spelling mistakes, irrelevant content, and always check the sender’s email address.
Links or attachments are the easiest way for malicious software to steal your login credentials or run harmful viruses. Always verify any out-of-the-ordinary requests for payment. Treat any changes in detail as unusual. If something seems off, it might be a warning sign.
Take a moment to pause and think before reacting. Avoid clicking on any links or responding to requests immediately, instead, call the sender to verify the authenticity of the email, consult with a colleague to see if they have encountered something similar, and report any suspicious messages.