How to go against phishing?

So, what can you do to minimize the likelihood you are fooled by a phishing attempt? Train yourself to spot the key characteristics of a phishing attempt:

1. The link in the message leads to an unrelated domain. Familiarize yourself with what the relevant parts of a domain name are to discern the trustworthiness:



This means that this link is pretty trustworthy:’

But these are a bit sketchy:’’

Also watch out for links that are referring to domains that look very similar:

  • (there is an ‘i’ missing in security)
  • (.me instead of .be)

2. The mail is sent from an unrelated domain. The structure of an email address domain follows the same structure as a web domain.


So watch out for mails coming from addresses in the form of

3. A sense of urgency. A phishing message wants you to act quickly, before you even have the chance to think about the contents of the message. Be wary of messages promising you gain something or warn you of losing something if you don’t react quickly.

4.The message is uncharacteristic. The message requests you to take an action that is out of the ordinary for the sender. Eg.:

  • Your bank asks you to provide sensitive information via mail.
  • Your IT team asks you to download and install some tool from a mail attachment or from the internet

Now, if you have doubts about the legitimacy of a message, how should you react?

  1. First and foremost, do not engage with a message you do not fully trust. Do not click any links, and do not reply.
  2. Contact the sender via known, and established channels.
    • Did you receive a suspicious message from the bank? Contact them, for example, via phone. Those phone numbers are printed on official documents and can be found on their main website (lookup the main website, and don’t engage with the link in the suspicious message)
    • Did you receive a suspicious request from the IT team? Contact your helpdesk via phone
  3. Report it to your Service Desk. Preferably, create a new mail and include the suspicious mail as attachment.
  4. Delete the suspicious mail
But most importantly, get in touch with professionals. Our team is always ready to help your company build up its defenses against hackers.