This article is intended for customers who want to learn how to identify phishing emails and avoid falling victim to scams.
Phishing emails are fraudulent messages designed to trick you into revealing sensitive information such as passwords, banking details, or login credentials. They often look like they come from trusted organisations but contain subtle clues that expose their malicious intent.
We use a range of techniques to combat spam and phishing emails, including advanced spam filters, RBL (real-time blacklist) checks, and security standards such as SPF, DKIM, and DMARC, which are enabled by default on all hosting accounts. While these measures block most malicious messages, no system is 100% foolproof — some phishing emails may still slip through.
Here’s how you can recognise and avoid them:
Step 1: Check the sender’s address
-
Even with anti-spam measures in place, scammers may forge display names that look genuine. Always check the full sender address, not just the display name.
-
Watch for small variations (e.g.
support@paypa1.com
instead ofsupport@paypal.com
).
Step 2: Look for suspicious subject lines and content
-
Be cautious of urgent or threatening language such as “Your account will be suspended” or “Verify now.”
-
Poor grammar, spelling mistakes, or unusual phrasing are common warning signs.
Step 3: Examine hyperlinks carefully
-
Hover over any link (without clicking) to see the destination URL.
-
If it points to a domain that doesn’t match the claimed organisation, don’t click it.
-
Avoid shortened or obfuscated links that hide the true destination.
Step 4: Treat unexpected attachments with caution
-
Attachments can contain malware, even if the file looks harmless (e.g. disguised Word or PDF files).
-
Never open an attachment unless you were expecting it and are sure of the sender’s identity.
Step 5: Watch for inconsistencies
-
Legitimate companies usually address you by name, while phishing attempts often use generic greetings like “Dear customer.”
-
Look out for mismatched logos, poor formatting, or email signatures that seem unusual.
Step 6: Verify through official channels
-
If you’re unsure whether an email is genuine, don’t reply to it and don’t click any links.
-
Contact the organisation directly using their official website or customer support details.
Step 7: Rely on built-in protections, but stay vigilant
-
Our servers automatically use spam filters, RBL checks, and authentication standards (SPF, DKIM, DMARC) to block most phishing emails.
-
Keep your computer and mobile devices updated, and use antivirus/anti-malware software for an extra layer of protection.
⚠️ Tip: If you receive a suspicious email originating from your domain hosted with us, please report it to us via a support ticket. We can investigate and help block further attempts.
Updated by SP on 30/09/2025