Here are quick tips about protecting yourself from phishing attacks.
In this article:
- Don't show login of your store account in public places
- Keep your firewall and security software up to date
- Make sure your connection to a website is secure
- Be extremely careful when clicking on links you receive via email
- Beware of email attachments
- Clear up your concerns using the alternative methods of communication
Don't show login of your store account in public places
Do not expose the email address that is linked to your store account, as it may be misused by online scammers. Show a different email address as a contact address on your website. If you are using Instant Site, make sure to specify a different email address in your store Control Panel → Instant Site → Edit Content → Contact Information.
Keep your firewall and security software up to date
Make sure your firewall and antivirus software are updated regularly and working properly. Although it can’t guarantee complete protection, updated security software and firewall protection is the first line of defence.
Make sure your connection to a website is secure
When you open a website where you can be asked to provide a username and password or any other sensitive information, make sure that the website is using a secure HTTPS connection. Your browser will indicate an HTTPS connection with a green lock icon that is displayed before the URL.
Be extremely careful when clicking on links you receive via email
If you’re about to click on a link inside of an email, you have to be absolutely certain who the email is coming from. In case you want to test the link, you can open a new browser window in incognito mode and type in the URL instead of clicking on the suspicious link.
Beware of email attachments
Don’t interact with attachments, unless you are expecting them and know what they contain. They might infect your system with viruses and malware that can damage the files on your computer, steal your passwords or spy on you without your knowledge.
Clear up your concerns using the alternative methods of communication
You can resolve your concerns about a suspicious message by talking to someone at the organization that has probably sent it. In this case you’d rather use a phone number you have on file or that appears on multiple reputable online sources, than the contact details from the email.