Even though delayed phishing tricks the security technologies, we can prevent it from tricking us. Let us look at a few best practices.

  • Always verify if the sender’s email ID is legitimate, before responding to an email.
  • Be cautious of links in the emails. Hover the mouse on the links to find the actual destination before clicking.
  • Check the authenticity of websites that opens up when clicking on links. Only proceed to activities after confirming its legitimacy.
  • Be wary of emails asking sensitive information. Check legitimacy through alternative means of communication – in person or by phone.