The Phishing Flow Chart

Here is a handy phishing flow chart that can help inexperienced computer users in analyzing potentially dangerous emails. Check out our how to identify phishing attacks guide for additional information and tips on phishing attacks.

The flow chart basically walks a user through the analysis of an email. It begins by identifying the sender and then checking consecutively if the email contains links or attachments and if it requests personal information.

Continue reading The Phishing Flow Chart