boxorandyos

Client support portal

How to verify a sender before responding

WHY VERIFY Attackers often impersonate coworkers, executives, vendors, customers, and support teams. CHECK Look at the full email address, not only the display name. Compare it to previous legitimate messages. Watch for extra letters, swapped domains, and external sender warnings. USE A SECOND CHANNEL For unusual requests involving money, credentials, confidential data, or urgency, verify through a trusted phone number, chat, or known contact method. DO NOT TRUST Do not trust a phone number or link provided only inside the suspicious message. BEST PRACTICE Slow down any request that asks for secrecy, urgency, or bypassing normal process.

← Back to knowledge base