How to verify a sender before responding
WHY VERIFY
Attackers often impersonate coworkers, executives, vendors, customers, and support teams.
CHECK
Look at the full email address, not only the display name. Compare it to previous legitimate messages. Watch for extra letters, swapped domains, and external sender warnings.
USE A SECOND CHANNEL
For unusual requests involving money, credentials, confidential data, or urgency, verify through a trusted phone number, chat, or known contact method.
DO NOT TRUST
Do not trust a phone number or link provided only inside the suspicious message.
BEST PRACTICE
Slow down any request that asks for secrecy, urgency, or bypassing normal process.