An influx of malicious emails, phishing attacks, and spam demands diligence. Protect yourself with these proven methods to identify suspicious emails. Start by finding clues in your inbox.

Identify a suspicious sender

Look for the following red flags in the sender’s information:

  • A ”?” in the sender image or profile
  • The email arrived “via” another mailbox or domain
  • The sender’s email address is different than what appears in the From address

Identify a suspicious link

Try a quick investigative technique to find the link’s real destination:

  • Hover over the link, but don’t click. A pop up will show the real address of the link.
  • Right click the link and Copy Hyperlink. Paste it into notepad to read the link destination.

Identify a suspicious destination address

Ignore extraneous text in the address url that is intended to obfuscate the real destination. Malicious sites will insert misleading names into the destination address to make it appear to belong to a well-known site.

It is important to ignore anything that comes before the second-to-last dot in the url. Also ignore whatever comes after the first slash in the address. The true destination address is what comes right after the second-to-last dot and before the first slash of the address url. Remember that your IT Department is always here to help, call 248-357-3980.

Proceed cautiously

If you choose to follow the link, try using one of the many great tools available to help you click safely.

Google Safe Browsing verifies whether a site currently contains content that Safe Browsing has determined to be dangerous. Type in this URL followed by the site you want to check.


You are your best defense! As your technology partner we are happy to develop tailored security awareness training to augment your spam filter: Call 248-357-3980