Phishing Awareness and Prevention

Overview

Phishing is one of the most common ways accounts are compromised. These messages are designed to look routine and trustworthy, often imitating webmail systems, hosting providers, or internal communications.

This article explains how phishing works, how to recognize suspicious messages, and what to do to protect your account and data.


What Is Phishing?

Phishing is a type of fraud where attackers impersonate legitimate organizations or individuals to trick you into:

  • Clicking malicious links

  • Downloading infected attachments

  • Entering passwords or personal information

  • Sending money or gift cards

Phishing messages often appear to come from trusted services such as webmail providers, hosting companies, banks, shipping carriers, or even church or business contacts.


Common Signs of a Phishing Message

Be cautious of any message that includes one or more of the following:

  • A sense of urgency or threat (for example: “Your account will be suspended today”)

  • Requests for passwords, login links, or verification codes

  • Unexpected attachments, especially ZIP, HTML, or PDF files

  • Misspellings, awkward phrasing, or unusual sender addresses

  • Generic greetings like “Dear user” instead of your name

  • Requests that bypass normal processes or feel “off”

Even messages that look professional can be malicious.


What To Do If You Receive a Suspicious Email

  1. Do not click links or open attachments

  2. Do not reply to the message

  3. Delete the email immediately

  4. If you are uncertain, you may forward the message to our support team before taking any action

Marking messages as spam or junk also helps improve filtering over time.


What We Will Never Ask For

We will never ask you to provide:

  • Passwords or login credentials by email

  • Verification codes

  • Payment information via unsolicited messages

  • Immediate action under threat or pressure

Any legitimate request from us will be communicated through known channels and in a verifiable way.


Recommended Anti-Phishing Training Resource

The following resource is reputable, concise, and suitable for both individuals and teams:


Final Reminder

Phishing attacks are ubiquitous and constantly evolving. The most effective defense is healthy skepticism combined with immediate deletion of anything suspicious.

If something does not feel right, pause and verify before acting. When in doubt, it is safer to delete first and ask questions later.

  • 0 Users Found This Useful
Was this answer helpful?

Related Articles

Resetting Your Site Manager Password

The Site Manager has two types of accounts: The Administrator Account, which uses a username...

Web Statistics Not Working

Web statistics are shown based upon the domain that is used to access the Site Manager. Would you...

Changing your password

To change your Site Manager password, go to the account menu in the top right of the header area...

Secure certificates and content

Your website has a secure certificate installed and may be viewed using "https".When your website...

Custom code

Custom code can be entered in a few ways:1) To add code inside the Head tags, go to...