{"id":8813,"date":"2015-11-24T11:00:11","date_gmt":"2015-11-24T16:00:11","guid":{"rendered":"https:\/\/southjerseytechies.net\/blog\/?p=8813"},"modified":"2025-05-05T00:53:30","modified_gmt":"2025-05-05T04:53:30","slug":"10-tips-for-spotting-a-phishing-email","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/","title":{"rendered":"10 tips for spotting a phishing email"},"content":{"rendered":"<p>Phishing emails flow into inboxes year-round, especially during the holidays. Here are some clues to help your users spot &#8220;fishy&#8221; emails.<\/p>\n<p>Every day countless phishing emails are sent to unsuspecting victims all over the world. While some of these messages are so outlandish that they are obvious frauds, others can be a bit more convincing. So how do you tell the difference between a phishing message and a legitimate message? Unfortunately, there is no one single technique that works in every situation, but there are a number of things that you can look for. This article lists 10 of them.<img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-8816\" src=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png\" alt=\"phishing email\" width=\"454\" height=\"454\" data-wp-pid=\"8816\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png 400w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261-150x150.png 150w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261-300x300.png 300w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261-200x200.png 200w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261-411x411.png 411w\" sizes=\"auto, (max-width: 454px) 100vw, 454px\" \/><\/p>\n<h2><a name=\"h.tsyai7xd8huj\"><\/a>1: The message contains a mismatched URL<\/h2>\n<p>One of the first things I recommend checking in a suspicious email message is the integrity of any embedded URLs. Oftentimes the URL in a phishing message will appear to be perfectly valid. However, if you hover your mouse over the top of the URL, you should see the actual hyperlinked address (at least in Outlook). If the hyperlinked address is different from the address that is displayed, the message is probably fraudulent or malicious.<\/p>\n<h2><a name=\"h.ag3ywvvyti0x\"><\/a>2: URLs contain a misleading domain name<\/h2>\n<p>People who launch phishing scams often depend on their victims not knowing how the DNS naming structure for domains works. The last part of a domain name is the most telling. For example, the domain name info.brienposey.com would be a child domain of brienposey.com because brienposey.com appears at the end of the full domain name (on the right-hand side). Conversely, brienposey.com.maliciousdomain.com would clearly not have originated from brienposey.com because the reference to brienposey.com is on the left side of the domain name.<\/p>\n<h2><a name=\"h.vwu5tvjrk44y\"><\/a>3: The message contains poor spelling and grammar<\/h2>\n<p>Whenever a large company sends out a message on behalf of the company as a whole, the message is usually reviewed for spelling, grammar, and legality, among other things. So if a message is filled with poor grammar or spelling mistakes, it probably didn&#8217;t come from a major corporation&#8217;s legal department.<\/p>\n<h2><a name=\"h.s6cqcg4c1bx\"><\/a>4: The message asks for personal information<\/h2>\n<p>No matter how official an email message might look, it&#8217;s always a bad sign if the message asks for personal information. Your bank doesn&#8217;t need you to send it your account number. It already knows what that is. Similarly, a reputable company should never send an email asking for your password, credit card number, or the answer to a security question.<\/p>\n<h2><a name=\"h.1yo8uw8ayj8p\"><\/a>5: The offer seems too good to be true<\/h2>\n<p>There is an old saying that if something seems too good to be true, it probably is. That holds especially true for email messages. If you receive a message from someone unknown to you who is making big promises, the message is probably a scam.<\/p>\n<h2>6: You didn&#8217;t initiate the action<\/h2>\n<p>If you get a message informing you that you have won a contest you did not enter, you can bet that the message is a scam.<\/p>\n<h2><a name=\"h.quffw3us7icc\"><\/a>7: You&#8217;re asked to send money to cover expenses<\/h2>\n<p>One telltale sign of a phishing email is that you will eventually be asked for money. You might not get hit up for cash in the initial message. But sooner or later, phishing artists will likely ask for money to cover expenses, taxes, fees, or something similar. If that happens, you can bet that it&#8217;s a scam.<\/p>\n<h2><a name=\"h.aa1uihnlzae3\"><\/a>8: The message makes unrealistic threats<\/h2>\n<p>Although most of the phishing scams try to trick people into giving up cash or sensitive information by promising instant riches, some phishing artists use intimidation to scare victims into giving up information. If a message makes unrealistic threats, it&#8217;s probably a scam.<\/p>\n<h2><a name=\"h.2r8n55jhz09t\"><\/a>9: The message appears to be from a government agency<\/h2>\n<p>Phishing artists who want to use intimidation don&#8217;t always pose as a bank. Sometimes they&#8217;ll send messages claiming to have come from a law enforcement agency, the IRS, the FBI, or just about any other entity that might scare the average law-abiding citizen.\u00a0But here, government agencies don&#8217;t normally use email as an initial point of contact. That isn&#8217;t to say that law enforcement and other government agencies don&#8217;t use email. However, law enforcement agencies follow certain protocols. They don&#8217;t engage in email-based extortion\u2014at least, not in my experience.<\/p>\n<h2><a name=\"h.tzf79dq1fvtm\"><\/a>10: Something just doesn&#8217;t look right<\/h2>\n<p>In Las Vegas, casino security teams are taught to look for anything that JDLR\u2014just doesn&#8217;t look right, as they call it. The idea is that if something looks off, there&#8217;s probably a good reason why. This same principle almost always applies to email messages. If you receive a message that seems suspicious, it&#8217;s usually in your best interest to avoid acting on the message.<\/p>\n<h4>Have questions?<\/h4>\n<p>Get help from IT Experts\/Microsofts Cloud Solutions Partner<br \/>\nCall us at:\u00a0856-745-9990 or visit:\u00a0<a href=\"https:\/\/southjerseytechies.net\/\">https:\/\/southjerseytechies.net\/<\/a><\/p>\n<p><a title=\"South Jersey Techies Website\" href=\"http:\/\/southjerseytechies.net\/\">South Jersey Techies, LLC<\/a>\u00a0is a full\u00a0<a title=\"South Jersey Techies Managed Services\" href=\"http:\/\/southjerseytechies.net\/\">Managed Web and Technology Services Company<\/a>\u00a0providing\u00a0IT Services,\u00a0<a title=\"South Jersey Techies:  Web Design\" href=\"http:\/\/southjerseytechies.net\/website_design.php\">Website Design Services<\/a>,\u00a0<a title=\"South Jersey Techies:  Server Support\" href=\"http:\/\/southjerseytechies.net\/server_install.php\">Server Support<\/a>,\u00a0<a title=\"South Jersey Techies:  Network Consulting\" href=\"http:\/\/southjerseytechies.net\/network_consulting.php\">Network Consulting<\/a>,\u00a0<a title=\"South Jersey Techies:  Internet Phones\" href=\"http:\/\/southjerseytechies.net\/voip.php\">Internet Phones<\/a>,\u00a0<a title=\"South Jersey Techies:  Cloud Solutions Provider\" href=\"http:\/\/southjerseytechies.net\/cloud.php\">Cloud Solutions Provider<\/a>\u00a0and much more.<a title=\"South Jersey Techies:  Contact\" href=\"http:\/\/southjerseytechies.net\/contact.php\">\u00a0Contact for More<\/a>\u00a0Information.<\/p>\n<p>To read this article in its entirety\u00a0<a href=\"https:\/\/web.archive.org\/web\/20241003145352\/https:\/\/www.techrepublic.com\/article\/10-tips-for-spotting-a-phishing-email\/\" target=\"_blank\">click here.<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing emails flow into inboxes year-round, especially during the holidays. Here are some clues to help your users spot &#8220;fishy&#8221; emails. Every day countless phishing emails are sent to unsuspecting victims all over the world. While some of these messages &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":8816,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[25,473,45],"tags":[469,1241,1240,63,1001,1242,1239],"class_list":["post-8813","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email-accounts","category-internet-security","category-quick-reference-guides","tag-bigbeagle-com","tag-misleading-domain-name","tag-mismatched-url","tag-south-jersey-techies","tag-spam-emails","tag-tips-to-protect-your-email-account","tag-tips-to-spot-phishing-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 tips for spotting a phishing email<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 tips for spotting a phishing email\" \/>\n<meta property=\"og:description\" content=\"Phishing emails flow into inboxes year-round, especially during the holidays. Here are some clues to help your users spot &#8220;fishy&#8221; emails. Every day countless phishing emails are sent to unsuspecting victims all over the world. While some of these messages &hellip;Continue Reading&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-24T16:00:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-05T04:53:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"10 tips for spotting a phishing email\",\"datePublished\":\"2015-11-24T16:00:11+00:00\",\"dateModified\":\"2025-05-05T04:53:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/\"},\"wordCount\":857,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png\",\"keywords\":[\"BigBeagle.com\",\"Misleading domain name\",\"Mismatched URL\",\"South Jersey Techies\",\"Spam Emails\",\"tips to protect your email account\",\"Tips to spot phishing email\"],\"articleSection\":[\"Email Accounts\",\"Internet Security\",\"Quick Reference Guides\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/\",\"name\":\"10 tips for spotting a phishing email\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png\",\"datePublished\":\"2015-11-24T16:00:11+00:00\",\"dateModified\":\"2025-05-05T04:53:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#primaryimage\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png\",\"width\":400,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 tips for spotting a phishing email\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 tips for spotting a phishing email","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/","og_locale":"en_US","og_type":"article","og_title":"10 tips for spotting a phishing email","og_description":"Phishing emails flow into inboxes year-round, especially during the holidays. Here are some clues to help your users spot &#8220;fishy&#8221; emails. Every day countless phishing emails are sent to unsuspecting victims all over the world. While some of these messages &hellip;Continue Reading&rarr;","og_url":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2015-11-24T16:00:11+00:00","article_modified_time":"2025-05-05T04:53:30+00:00","og_image":[{"width":400,"height":400,"url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png","type":"image\/png"}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"10 tips for spotting a phishing email","datePublished":"2015-11-24T16:00:11+00:00","dateModified":"2025-05-05T04:53:30+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/"},"wordCount":857,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png","keywords":["BigBeagle.com","Misleading domain name","Mismatched URL","South Jersey Techies","Spam Emails","tips to protect your email account","Tips to spot phishing email"],"articleSection":["Email Accounts","Internet Security","Quick Reference Guides"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/","url":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/","name":"10 tips for spotting a phishing email","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#primaryimage"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png","datePublished":"2015-11-24T16:00:11+00:00","dateModified":"2025-05-05T04:53:30+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#primaryimage","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png","width":400,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/10-tips-for-spotting-a-phishing-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"10 tips for spotting a phishing email"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2015\/11\/billionphotos-944261.png","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-2i9","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8813","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=8813"}],"version-history":[{"count":7,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8813\/revisions"}],"predecessor-version":[{"id":14774,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/8813\/revisions\/14774"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media\/8816"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=8813"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=8813"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=8813"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}