{"id":30983,"date":"2025-10-12T14:59:27","date_gmt":"2025-10-12T12:59:27","guid":{"rendered":"https:\/\/blog.1-grid.com\/?p=30983"},"modified":"2025-10-22T15:18:48","modified_gmt":"2025-10-22T13:18:48","slug":"how-to-stay-safe-from-phishing-attacks","status":"publish","type":"post","link":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/","title":{"rendered":"Security Alert: How to Stay Safe from Phishing Attacks"},"content":{"rendered":"<p>[et_pb_section][et_pb_row][et_pb_column type=&#8221;4_4&#8243;][et_pb_text]<\/p>\n<p>Phishing emails are becoming an increasingly serious threat in South Africa, with recent reports showing that hundreds of local businesses fall victim to these scams every year. From the recent cases that have been reported, the <a href=\"https:\/\/www.capetownetc.com\/news\/urgent-warning-south-african-small-businesses-targeted-by-rfq-scam\/\">lowest loss was R600 000<\/a> which can be crippling for a small or medium business.<\/p>\n<p>This article will provide seven practical ways to spot phishing emails, share real-life examples of scams targeting South African businesses, and outline clear steps to avoid and prevent phishing attacks.<\/p>\n<p>By understanding the warning signs and implementing effective safeguards, SMEs can protect themselves and their customers from costly cyber threats.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-31211 aligncenter\" src=\"https:\/\/1grid.co.za\/blog\/wp-content\/uploads\/2025\/10\/how-to-spot-a-phising-email.jpg\" alt=\"how to spot a phishing email\" width=\"750\" height=\"563\" \/><\/p>\n<h2>What Is a Phishing Email (and Scam Emails)<\/h2>\n<p>A phishing email is a fraudulent message crafted to deceive recipients into revealing sensitive information such as login credentials, banking details, or personal data. While \u201cscam emails\u201d and \u201cfake emails\u201d are general terms used for fraudulent communication, phishing emails specifically mimic trusted organisations or individuals to steal information or install malicious software.<\/p>\n<p>The ultimate goal of phishing is to exploit trust for financial or data gain. Some attackers aim to steal passwords or credit card details (credential theft), while others use phishing as a gateway to financial fraud or to install ransomware that locks company systems until a ransom is paid.<\/p>\n<p>Phishing campaigns often rely on psychological manipulation, using fear, urgency, or authority to push victims into acting quickly without verifying legitimacy. A common tactic is to use spoofed or look-alike domains that resemble real company addresses. <a href=\"https:\/\/1grid.co.za\/website-security\/ssl\/\">Domain security measures<\/a> like SPF, DKIM, and DMARC help prevent these impersonation attempts by verifying the authenticity of sender domains, protecting both businesses and customers from fraudulent communication.<\/p>\n<h2>7 Ways to Spot Phishing Emails<\/h2>\n<p>Spotting a phishing email can be tricky, especially as cybercriminals continue to refine their tactics and impersonate trusted brands. However, there are clear warning signs that can help you identify fraudulent emails before they cause harm. By learning what to look for, you can protect your business, your data, and your finances.<\/p>\n<p>Here are seven key ways to recognise a phishing email and avoid becoming a victim.<\/p>\n<h3>1. Check the Sender\u2019s Address Carefully<\/h3>\n<p>The sender\u2019s email address is often the first clue that something is off. Phishing emails frequently use domain mismatches, subtle typos, or look-alike domains designed to deceive.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-31022 size-full\" src=\"https:\/\/1grid.co.za\/blog\/\/wp-content\/uploads\/2025\/03\/image-3.png\" alt=\"how to spot a phishing email example\" width=\"1060\" height=\"736\" \/><\/p>\n<p>For example, an email from \u201c<a href=\"mailto:support@1-grld.com\">support@1-grld.com<\/a>\u201d or \u201c<a href=\"mailto:billing@1grid.co.za\">billing@1grid.co.za<\/a>\u201d might look legitimate at a glance but are not from 1-grid\u2019s official domain. Genuine 1-grid communication always comes from \u201c@1-grid.com\u201d.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-31021 size-full\" src=\"https:\/\/1grid.co.za\/blog\/\/wp-content\/uploads\/2025\/03\/image-2.png\" alt=\"how to spot a phishing email - legitimate email sample\" width=\"853\" height=\"636\" \/><\/p>\n<h3>2. Poor Grammar, Spelling Mistakes, and Formatting Oddities<\/h3>\n<p>Professional companies have communication standards, so frequent spelling errors, poor grammar, or strange sentence structures are red flags. Phishing emails are often mass-produced and translated from other languages, resulting in unnatural phrasing or awkward punctuation.<\/p>\n<p>If an email that claims to be from a well-known South African business or service provider contains noticeable typos or inconsistent branding, treat it as suspicious. Legitimate organisations rarely make such mistakes in official correspondence.<\/p>\n<h3>3. Urgency, Threats, or Pressure to Act Immediately<\/h3>\n<p>Scammers rely on emotional triggers to push people into quick action. Phrases such as \u201cYour account will be suspended\u201d, \u201cFinal warning\u201d, or \u201cImmediate payment required\u201d are classic signs of a phishing attempt.<\/p>\n<p>The goal is to create panic and make you respond before thinking.<\/p>\n<p>In South Africa, phishing campaigns often target small businesses with urgent payment requests or fake invoices related to domain renewals, SARS refunds, or courier deliveries.<\/p>\n<p>Always pause and verify the message through official channels rather than reacting on impulse.<\/p>\n<h3>4. Unexpected Attachments or Links<\/h3>\n<p>Phishing emails frequently contain attachments or links that appear harmless but lead to malicious sites or download malware. Always hover your cursor over a link to preview the actual URL before clicking. If the address looks strange or does not match the company\u2019s official website, do not open it.<\/p>\n<p>In many South African cases, attackers have used fake \u201cProof of Payment\u201d attachments or links that mimic legitimate banking pages. If you were not expecting an attachment or link, verify with the sender before opening anything.<\/p>\n<h3>5. Requests for Sensitive Information<\/h3>\n<p>Legitimate organisations will never ask you to share passwords, banking details, or personal information via email. If an email requests such data, it is almost certainly a phishing attempt. These scams often use convincing language like \u201cverify your account\u201d or \u201cconfirm your details\u201d to appear credible.<\/p>\n<p>Phishers in South Africa have been known to impersonate financial institutions, mobile providers, and even government departments to gather personal data for identity theft or financial fraud. Always log in directly through the company\u2019s official website instead of using links in an email.<\/p>\n<h3>6. Generic Greetings or Mismatched Branding<\/h3>\n<p>A common giveaway is when the email uses a generic greeting such as \u201cDear Customer\u201d instead of addressing you by name. Inconsistent or poor-quality branding, distorted logos, or unusual colour schemes are also signs of a fake. These details suggest the sender does not have access to official communication templates.<\/p>\n<p>For example, a phishing email claiming to be from a South African courier company might have a blurry logo or outdated design. Compare it to a genuine email from the same company to spot discrepancies quickly.<\/p>\n<h3>7. Suspicious or Unusual Context<\/h3>\n<p>Sometimes an email simply feels \u201coff\u201d. You might receive an invoice for a service you never ordered or an email from a senior colleague requesting gift cards or urgent payments.<\/p>\n<p>Context is key. If it does not make sense, it probably is not real.<\/p>\n<p>In South Africa, phishing scams often reference local institutions, events, or transactions to sound believable, such as municipal bills or vehicle licence renewals. Always confirm directly with the person or organisation through verified contact details before responding.<\/p>\n<h2>Recent Phishing Email Examples from South Africa<\/h2>\n<p>Below are two examples of phishing scams that circulated in South Africa, showing how convincing these emails can look and the red flags that give them away.<\/p>\n<h3>Example 1: Gripper \/ Ganedhi invoice redirection scam<\/h3>\n<p>A longstanding supplier\u2013client relationship existed between Gripper &amp; Company (Pty) Ltd and Ganedhi Trading Enterprises CC. In 2021, Gripper delivered goods (valves) and issued invoices with its known Standard Bank account details.<\/p>\n<p>Later, Ganedhi received an email that appeared to come from Gripper\u2019s managing director (\u201cMax Hafen\u201d) saying that the banking details had changed and that the new account was with Absa Bank.<\/p>\n<p>Ganedhi paid into that new Absa account. Later, Gripper asked for payment, and <a href=\"https:\/\/www.saflii.org\/za\/cases\/ZAWCHC\/2024\/352.html\">the fraud was uncovered<\/a>: the payment had gone to a bank account controlled by the fraudster, not Gripper.<\/p>\n<h4>What the email looked like &amp; red flags:<\/h4>\n<ul>\n<li>The email address was \u201cmax@griper.co.za\u201d instead of \u201cmax@gripper.co.za\u201d (a missing \u201cp\u201d); a subtle typo in the domain name.<\/li>\n<li>It asked Ganedhi to change longstanding banking instructions, which is unusual for mature business relationships.<\/li>\n<li>There was no independent verification (e.g. phone call) to confirm the change before payment. Ganedhi simply trusted the email instructions.<a href=\"https:\/\/www.moonstone.co.za\/debtor-carries-the-risk-says-high-court-in-ruling-on-cyber-fraud-liability\/?utm_source=chatgpt.com\"><br \/>\n<\/a><\/li>\n<\/ul>\n<h4>How it was detected \/ how it could have been avoided:<\/h4>\n<ul>\n<li>The mismatch in email domain (\u201cgriper\u201d vs \u201cgripper\u201d) should have triggered suspicion.<\/li>\n<li>Had Ganedhi contacted Gripper via a known phone number (not via email) to confirm the bank change, the scam would likely have failed.<\/li>\n<li>When Gripper queried nonpayment, the inconsistency raised alarms and led to investigation.<\/li>\n<\/ul>\n<h3>Example 2: Motus \/ Movienet BEC (Business Email Compromise) in vehicle sale<\/h3>\n<p>In the legal case <a href=\"https:\/\/www.financialinstitutionslegalsnapshot.com\/2024\/09\/26\/business-email-compromise-halts-car-sale\/\">Movienet Networks (Pty) Ltd v Motus Ford Culemborg<\/a>, a scenario unfolded where a deposit payment was diverted via email compromise. The buyer (Movienet) had agreed to purchase a vehicle and paid a deposit based on emailed banking instructions.<\/p>\n<p>However, fraudsters intervened and changed the bank details in the communication, causing the payment to land in their account instead of the legitimate dealership\u2019s account.<\/p>\n<p>The Motus group challenged the return of the vehicle, legal actions followed, and forensic examination of emails and headers was performed to trace the compromises.<\/p>\n<h4>What the email looked like &amp; red flags:<\/h4>\n<ul>\n<li>The \u201creply-to\u201d address differed from the \u201cfrom\u201d address; <a href=\"https:\/\/1grid.co.za\/blog\/how-to-choose-a-domain-name-for-your-website\/\">a genuine business would rarely<\/a> send invoices with reply-to addresses on free domains (e.g. Gmail) or changing domains.<\/li>\n<li>The email header showed that the return path domain did not align with the \u201cfrom\u201d domain, hinting at spoofing.<\/li>\n<li>There was no DMARC policy in place on the implicated domains, so they were vulnerable to impersonation or spoofing.<\/li>\n<\/ul>\n<h4>How it was detected \/ how it could have been avoided:<\/h4>\n<ul>\n<li>Forensic investigation of email headers and authentication (SPF, DMARC) flagged anomalies.<\/li>\n<li>If Movienet had verified the bank account change by telephone or another trusted channel, the interception likely would have failed.<\/li>\n<\/ul>\n<h2>How to Avoid Phishing: Proactive Measures<\/h2>\n<p>Avoiding phishing attacks requires a mix of awareness, technology, and proactive security measures. Even the most advanced email filters cannot catch every attempt, which is why businesses need both technical defences and well-informed employees.<\/p>\n<p>Below are key strategies to help your organisation reduce the risk of falling victim to phishing.<\/p>\n<ul>\n<li><strong>Train your team<\/strong>: employees are your first line of defence. Regular training sessions help staff recognise phishing emails and understand what to do if they receive one. Use real-world examples, such as local scams, and provide refresher courses every few months to keep awareness high.<\/li>\n<li><strong>Use email filters and security tools<\/strong>: implement spam filters, antivirus software, and endpoint protection to detect and block suspicious emails before they reach users. These tools analyse sender behaviour, attachments, and links for known phishing indicators.<\/li>\n<li><strong>Secure your domain<\/strong>: protect your business domain using SPF, DKIM, and DMARC authentication protocols. These tools verify that emails claiming to come from your company are legitimate, reducing the risk of domain spoofing. Also, consider secure DNS practices to prevent redirection to fraudulent websites.<\/li>\n<li><strong>Enable multi-factor authentication (MFA)<\/strong>: MFA adds a second layer of protection, such as a verification code or biometric check, even if an attacker steals a password. This extra step can stop most phishing-related breaches.<\/li>\n<li><strong>Use backup and SSL certificate solutions<\/strong>: 1-grid\u2019s Backup and SSL Certificate products provide essential layers of protection for your website and data. <a href=\"https:\/\/1grid.co.za\/website-security\/website-backups\/\">Automatic backups safeguard your business<\/a> information against loss during cyberattacks or technical failures, while <a href=\"https:\/\/1grid.co.za\/website-security\/ssl\/\">SSL Certificates encrypt communication<\/a> between your website and users. This builds trust, protects customer information, and reduces the risk of data interception during phishing attempts.<\/li>\n<\/ul>\n<h2>How to Prevent Phishing Attacks: Company Policy &amp; Culture<\/h2>\n<p>Building a strong company culture around cybersecurity is just as important as using technical safeguards. When employees feel empowered to question, verify, and report suspicious activity, the entire organisation becomes more resilient to phishing attacks.<\/p>\n<p>Here are some effective ways to build that culture and strengthen defences through policy and practice.<\/p>\n<ul>\n<li><strong>Set clear reporting policies<\/strong>: establish a simple, well-communicated process for reporting suspicious emails. Whether it\u2019s through a dedicated inbox or an internal reporting button, employees should know exactly what to do when they spot something unusual. Quick reporting allows IT teams to investigate and prevent wider compromise.<\/li>\n<li><strong>Promote a verification mindset<\/strong>: encourage employees to double-check any request involving money transfers, password changes, or confidential information. A quick phone call or face-to-face confirmation can prevent major losses. Reinforce that it is always better to verify than to assume.<\/li>\n<li><strong>Run phishing simulations<\/strong>: conduct regular phishing simulations to test employee awareness in real-world conditions. These exercises help identify weak points and provide a safe way for staff to learn from mistakes. Regular \u201cphish tests\u201d build vigilance and turn cybersecurity into a shared responsibility across the organisation.<\/li>\n<\/ul>\n<h2>What To Do If You Think You\u2019ve Received a Phishing Email<\/h2>\n<p>Receiving a phishing email can be alarming. Follow these clear steps to protect yourself and your business.<\/p>\n<ol>\n<li><strong>Do not reply<\/strong>: never engage with the sender or provide any information.<\/li>\n<li><strong>Do not click links or open attachments<\/strong>: these may install malware or lead to fake payment pages.<\/li>\n<li><strong>Report internally<\/strong>: forward the <a href=\"https:\/\/1grid.co.za\/professional-email\/\">email to your IT or security team<\/a> using the organisation&#8217;s reporting channel and mark it for prompt investigation.<\/li>\n<li><strong>Notify authorities<\/strong>: if the email involves fraud or financial loss, report it to the <a href=\"https:\/\/www.saps.gov.za\/\">South African Police Service (SAPS)<\/a> and <a href=\"https:\/\/www.safps.org.za\/\">South African Fraud Prevention Services<\/a>. Also notify your bank if payment information was exposed.<\/li>\n<li><strong>Change passwords immediately<\/strong>: if credentials may be compromised, change your passwords as soon as possible. Be sure to use strong unique passwords and enable multi factor authentication across affected accounts.<\/li>\n<li><strong>Check accounts and log<\/strong>: review bank statements, transaction histories and account access logs for unauthorised activity and raise disputes where necessary.<\/li>\n<\/ol>\n<p>If you are unsure whether an email is genuine, feel free to <a href=\"https:\/\/1grid.co.za\/contact-us\/\">contact us at 1-grid<\/a> for verification and assistance. We are here to help keep your business secure.<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Think that email looks official? Think again. A clever phishing scam is making the rounds. But don\u2019t worry \u2014 we\u2019ve got your back. In this blog, we\u2019ll show you how to spot the fakes, dodge the scams, and keep your business safe online.<\/p>\n","protected":false},"author":24,"featured_media":31211,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"<p>Phishing emails are becoming an increasingly serious threat in South Africa, with recent reports showing that hundreds of local businesses fall victim to these scams every year. From the recent cases that have been reported, the <a href=\"https:\/\/www.capetownetc.com\/news\/urgent-warning-south-african-small-businesses-targeted-by-rfq-scam\/\">lowest loss was R600 000<\/a> which can be crippling for a small or medium business.<\/p><p>This article will provide seven practical ways to spot phishing emails, share real-life examples of scams targeting South African businesses, and outline clear steps to avoid and prevent phishing attacks.<\/p><p>By understanding the warning signs and implementing effective safeguards, SMEs can protect themselves and their customers from costly cyber threats.<\/p><p><img class=\"size-full wp-image-31211 aligncenter\" src=\"https:\/\/1grid.co.za\/blog\/wp-content\/uploads\/2025\/10\/how-to-spot-a-phising-email.jpg\" alt=\"how to spot a phishing email\" width=\"750\" height=\"563\" \/><\/p><h2>What Is a Phishing Email (and Scam Emails)<\/h2><p>A phishing email is a fraudulent message crafted to deceive recipients into revealing sensitive information such as login credentials, banking details, or personal data. While \u201cscam emails\u201d and \u201cfake emails\u201d are general terms used for fraudulent communication, phishing emails specifically mimic trusted organisations or individuals to steal information or install malicious software.<\/p><p>The ultimate goal of phishing is to exploit trust for financial or data gain. Some attackers aim to steal passwords or credit card details (credential theft), while others use phishing as a gateway to financial fraud or to install ransomware that locks company systems until a ransom is paid.<\/p><p>Phishing campaigns often rely on psychological manipulation, using fear, urgency, or authority to push victims into acting quickly without verifying legitimacy. A common tactic is to use spoofed or look-alike domains that resemble real company addresses. <a href=\"https:\/\/1grid.co.za\/website-security\/ssl\/\">Domain security measures<\/a> like SPF, DKIM, and DMARC help prevent these impersonation attempts by verifying the authenticity of sender domains, protecting both businesses and customers from fraudulent communication.<\/p><h2>7 Ways to Spot Phishing Emails<\/h2><p>Spotting a phishing email can be tricky, especially as cybercriminals continue to refine their tactics and impersonate trusted brands. However, there are clear warning signs that can help you identify fraudulent emails before they cause harm. By learning what to look for, you can protect your business, your data, and your finances.<\/p><p>Here are seven key ways to recognise a phishing email and avoid becoming a victim.<\/p><h3>1. Check the Sender\u2019s Address Carefully<\/h3><p>The sender\u2019s email address is often the first clue that something is off. Phishing emails frequently use domain mismatches, subtle typos, or look-alike domains designed to deceive.<\/p><p><img class=\"aligncenter wp-image-31022 size-full\" src=\"https:\/\/1grid.co.za\/blog\/\/wp-content\/uploads\/2025\/03\/image-3.png\" alt=\"how to spot a phishing email example\" width=\"1060\" height=\"736\" \/><\/p><p>For example, an email from \u201c<a href=\"mailto:support@1-grld.com\">support@1-grld.com<\/a>\u201d or \u201c<a href=\"mailto:billing@1grid.co.za\">billing@1grid.co.za<\/a>\u201d might look legitimate at a glance but are not from 1-grid\u2019s official domain. Genuine 1-grid communication always comes from \u201c@1-grid.com\u201d.<\/p><p><img class=\"aligncenter wp-image-31021 size-full\" src=\"https:\/\/1grid.co.za\/blog\/\/wp-content\/uploads\/2025\/03\/image-2.png\" alt=\"how to spot a phishing email - legitimate email sample\" width=\"853\" height=\"636\" \/><\/p><h3>2. Poor Grammar, Spelling Mistakes, and Formatting Oddities<\/h3><p>Professional companies have communication standards, so frequent spelling errors, poor grammar, or strange sentence structures are red flags. Phishing emails are often mass-produced and translated from other languages, resulting in unnatural phrasing or awkward punctuation.<\/p><p>If an email that claims to be from a well-known South African business or service provider contains noticeable typos or inconsistent branding, treat it as suspicious. Legitimate organisations rarely make such mistakes in official correspondence.<\/p><h3>3. Urgency, Threats, or Pressure to Act Immediately<\/h3><p>Scammers rely on emotional triggers to push people into quick action. Phrases such as \u201cYour account will be suspended\u201d, \u201cFinal warning\u201d, or \u201cImmediate payment required\u201d are classic signs of a phishing attempt.<\/p><p>The goal is to create panic and make you respond before thinking.<\/p><p>In South Africa, phishing campaigns often target small businesses with urgent payment requests or fake invoices related to domain renewals, SARS refunds, or courier deliveries.<\/p><p>Always pause and verify the message through official channels rather than reacting on impulse.<\/p><h3>4. Unexpected Attachments or Links<\/h3><p>Phishing emails frequently contain attachments or links that appear harmless but lead to malicious sites or download malware. Always hover your cursor over a link to preview the actual URL before clicking. If the address looks strange or does not match the company\u2019s official website, do not open it.<\/p><p>In many South African cases, attackers have used fake \u201cProof of Payment\u201d attachments or links that mimic legitimate banking pages. If you were not expecting an attachment or link, verify with the sender before opening anything.<\/p><h3>5. Requests for Sensitive Information<\/h3><p>Legitimate organisations will never ask you to share passwords, banking details, or personal information via email. If an email requests such data, it is almost certainly a phishing attempt. These scams often use convincing language like \u201cverify your account\u201d or \u201cconfirm your details\u201d to appear credible.<\/p><p>Phishers in South Africa have been known to impersonate financial institutions, mobile providers, and even government departments to gather personal data for identity theft or financial fraud. Always log in directly through the company\u2019s official website instead of using links in an email.<\/p><h3>6. Generic Greetings or Mismatched Branding<\/h3><p>A common giveaway is when the email uses a generic greeting such as \u201cDear Customer\u201d instead of addressing you by name. Inconsistent or poor-quality branding, distorted logos, or unusual colour schemes are also signs of a fake. These details suggest the sender does not have access to official communication templates.<\/p><p>For example, a phishing email claiming to be from a South African courier company might have a blurry logo or outdated design. Compare it to a genuine email from the same company to spot discrepancies quickly.<\/p><h3>7. Suspicious or Unusual Context<\/h3><p>Sometimes an email simply feels \u201coff\u201d. You might receive an invoice for a service you never ordered or an email from a senior colleague requesting gift cards or urgent payments.<\/p><p>Context is key. If it does not make sense, it probably is not real.<\/p><p>In South Africa, phishing scams often reference local institutions, events, or transactions to sound believable, such as municipal bills or vehicle licence renewals. Always confirm directly with the person or organisation through verified contact details before responding.<\/p><h2>Recent Phishing Email Examples from South Africa<\/h2><p>Below are two examples of phishing scams that circulated in South Africa, showing how convincing these emails can look and the red flags that give them away.<\/p><h3>Example 1: Gripper \/ Ganedhi invoice redirection scam<\/h3><p>A longstanding supplier\u2013client relationship existed between Gripper &amp; Company (Pty) Ltd and Ganedhi Trading Enterprises CC. In 2021, Gripper delivered goods (valves) and issued invoices with its known Standard Bank account details.<\/p><p>Later, Ganedhi received an email that appeared to come from Gripper\u2019s managing director (\u201cMax Hafen\u201d) saying that the banking details had changed and that the new account was with Absa Bank.<\/p><p>Ganedhi paid into that new Absa account. Later, Gripper asked for payment, and <a href=\"https:\/\/www.saflii.org\/za\/cases\/ZAWCHC\/2024\/352.html\">the fraud was uncovered<\/a>: the payment had gone to a bank account controlled by the fraudster, not Gripper.<\/p><h4>What the email looked like &amp; red flags:<\/h4><ul><li>The email address was \u201cmax@griper.co.za\u201d instead of \u201cmax@gripper.co.za\u201d (a missing \u201cp\u201d); a subtle typo in the domain name.<\/li><li>It asked Ganedhi to change longstanding banking instructions, which is unusual for mature business relationships.<\/li><li>There was no independent verification (e.g. phone call) to confirm the change before payment. Ganedhi simply trusted the email instructions.<a href=\"https:\/\/www.moonstone.co.za\/debtor-carries-the-risk-says-high-court-in-ruling-on-cyber-fraud-liability\/?utm_source=chatgpt.com\"><br \/><\/a><\/li><\/ul><h4>How it was detected \/ how it could have been avoided:<\/h4><ul><li>The mismatch in email domain (\u201cgriper\u201d vs \u201cgripper\u201d) should have triggered suspicion.<\/li><li>Had Ganedhi contacted Gripper via a known phone number (not via email) to confirm the bank change, the scam would likely have failed.<\/li><li>When Gripper queried nonpayment, the inconsistency raised alarms and led to investigation.<\/li><\/ul><h3>Example 2: Motus \/ Movienet BEC (Business Email Compromise) in vehicle sale<\/h3><p>In the legal case <a href=\"https:\/\/www.financialinstitutionslegalsnapshot.com\/2024\/09\/26\/business-email-compromise-halts-car-sale\/\">Movienet Networks (Pty) Ltd v Motus Ford Culemborg<\/a>, a scenario unfolded where a deposit payment was diverted via email compromise. The buyer (Movienet) had agreed to purchase a vehicle and paid a deposit based on emailed banking instructions.<\/p><p>However, fraudsters intervened and changed the bank details in the communication, causing the payment to land in their account instead of the legitimate dealership\u2019s account.<\/p><p>The Motus group challenged the return of the vehicle, legal actions followed, and forensic examination of emails and headers was performed to trace the compromises.<\/p><h4>What the email looked like &amp; red flags:<\/h4><ul><li>The \u201creply-to\u201d address differed from the \u201cfrom\u201d address; <a href=\"https:\/\/1grid.co.za\/blog\/how-to-choose-a-domain-name-for-your-website\/\">a genuine business would rarely<\/a> send invoices with reply-to addresses on free domains (e.g. Gmail) or changing domains.<\/li><li>The email header showed that the return path domain did not align with the \u201cfrom\u201d domain, hinting at spoofing.<\/li><li>There was no DMARC policy in place on the implicated domains, so they were vulnerable to impersonation or spoofing.<\/li><\/ul><h4>How it was detected \/ how it could have been avoided:<\/h4><ul><li>Forensic investigation of email headers and authentication (SPF, DMARC) flagged anomalies.<\/li><li>If Movienet had verified the bank account change by telephone or another trusted channel, the interception likely would have failed.<\/li><\/ul><h2>How to Avoid Phishing: Proactive Measures<\/h2><p>Avoiding phishing attacks requires a mix of awareness, technology, and proactive security measures. Even the most advanced email filters cannot catch every attempt, which is why businesses need both technical defences and well-informed employees.<\/p><p>Below are key strategies to help your organisation reduce the risk of falling victim to phishing.<\/p><ul><li><strong>Train your team<\/strong>: employees are your first line of defence. Regular training sessions help staff recognise phishing emails and understand what to do if they receive one. Use real-world examples, such as local scams, and provide refresher courses every few months to keep awareness high.<\/li><li><strong>Use email filters and security tools<\/strong>: implement spam filters, antivirus software, and endpoint protection to detect and block suspicious emails before they reach users. These tools analyse sender behaviour, attachments, and links for known phishing indicators.<\/li><li><strong>Secure your domain<\/strong>: protect your business domain using SPF, DKIM, and DMARC authentication protocols. These tools verify that emails claiming to come from your company are legitimate, reducing the risk of domain spoofing. Also, consider secure DNS practices to prevent redirection to fraudulent websites.<\/li><li><strong>Enable multi-factor authentication (MFA)<\/strong>: MFA adds a second layer of protection, such as a verification code or biometric check, even if an attacker steals a password. This extra step can stop most phishing-related breaches.<\/li><li><strong>Use backup and SSL certificate solutions<\/strong>: 1-grid\u2019s Backup and SSL Certificate products provide essential layers of protection for your website and data. <a href=\"https:\/\/1grid.co.za\/website-security\/website-backups\/\">Automatic backups safeguard your business<\/a> information against loss during cyberattacks or technical failures, while <a href=\"https:\/\/1grid.co.za\/website-security\/ssl\/\">SSL Certificates encrypt communication<\/a> between your website and users. This builds trust, protects customer information, and reduces the risk of data interception during phishing attempts.<\/li><\/ul><h2>How to Prevent Phishing Attacks: Company Policy &amp; Culture<\/h2><p>Building a strong company culture around cybersecurity is just as important as using technical safeguards. When employees feel empowered to question, verify, and report suspicious activity, the entire organisation becomes more resilient to phishing attacks.<\/p><p>Here are some effective ways to build that culture and strengthen defences through policy and practice.<\/p><ul><li><strong>Set clear reporting policies<\/strong>: establish a simple, well-communicated process for reporting suspicious emails. Whether it\u2019s through a dedicated inbox or an internal reporting button, employees should know exactly what to do when they spot something unusual. Quick reporting allows IT teams to investigate and prevent wider compromise.<\/li><li><strong>Promote a verification mindset<\/strong>: encourage employees to double-check any request involving money transfers, password changes, or confidential information. A quick phone call or face-to-face confirmation can prevent major losses. Reinforce that it is always better to verify than to assume.<\/li><li><strong>Run phishing simulations<\/strong>: conduct regular phishing simulations to test employee awareness in real-world conditions. These exercises help identify weak points and provide a safe way for staff to learn from mistakes. Regular \u201cphish tests\u201d build vigilance and turn cybersecurity into a shared responsibility across the organisation.<\/li><\/ul><h2>What To Do If You Think You\u2019ve Received a Phishing Email<\/h2><p>Receiving a phishing email can be alarming. Follow these clear steps to protect yourself and your business.<\/p><ol><li><strong>Do not reply<\/strong>: never engage with the sender or provide any information.<\/li><li><strong>Do not click links or open attachments<\/strong>: these may install malware or lead to fake payment pages.<\/li><li><strong>Report internally<\/strong>: forward the <a href=\"https:\/\/1grid.co.za\/professional-email\/\">email to your IT or security team<\/a> using the organisation's reporting channel and mark it for prompt investigation.<\/li><li><strong>Notify authorities<\/strong>: if the email involves fraud or financial loss, report it to the <a href=\"https:\/\/www.saps.gov.za\/\">South African Police Service (SAPS)<\/a> and <a href=\"https:\/\/www.safps.org.za\/\">South African Fraud Prevention Services<\/a>. Also notify your bank if payment information was exposed.<\/li><li><strong>Change passwords immediately<\/strong>: if credentials may be compromised, change your passwords as soon as possible. Be sure to use strong unique passwords and enable multi factor authentication across affected accounts.<\/li><li><strong>Check accounts and log<\/strong>: review bank statements, transaction histories and account access logs for unauthorised activity and raise disputes where necessary.<\/li><\/ol><p>If you are unsure whether an email is genuine, feel free to <a href=\"https:\/\/1grid.co.za\/contact-us\/\">contact us at 1-grid<\/a> for verification and assistance. We are here to help keep your business secure.<\/p>","_et_gb_content_width":"","footnotes":""},"categories":[3274,2970],"tags":[],"class_list":["post-30983","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-email","category-guides"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>7 Ways to Spot Phishing Emails: A Guide for South African SMEs<\/title>\n<meta name=\"description\" content=\"Beware of phishing scams targeting hosting customers. Learn how to spot fake emails and protect your account from fraud with our expert tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Ways to Spot Phishing Emails: A Guide for South African SMEs\" \/>\n<meta property=\"og:description\" content=\"Beware of phishing scams targeting hosting customers. Learn how to spot fake emails and protect your account from fraud with our expert tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"1-grid Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/1grid.co.za\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-10-12T12:59:27+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-22T13:18:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1grid.co.za\/blog\/wp-content\/uploads\/2025\/10\/how-to-spot-a-phising-email.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"563\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"1-grid Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@1grid_hosting\" \/>\n<meta name=\"twitter:site\" content=\"@1grid_hosting\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"1-grid Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Ways to Spot Phishing Emails: A Guide for South African SMEs","description":"Beware of phishing scams targeting hosting customers. Learn how to spot fake emails and protect your account from fraud with our expert tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/","og_locale":"en_US","og_type":"article","og_title":"7 Ways to Spot Phishing Emails: A Guide for South African SMEs","og_description":"Beware of phishing scams targeting hosting customers. Learn how to spot fake emails and protect your account from fraud with our expert tips.","og_url":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/","og_site_name":"1-grid Blog","article_publisher":"https:\/\/www.facebook.com\/1grid.co.za\/","article_published_time":"2025-10-12T12:59:27+00:00","article_modified_time":"2025-10-22T13:18:48+00:00","og_image":[{"width":750,"height":563,"url":"https:\/\/1grid.co.za\/blog\/wp-content\/uploads\/2025\/10\/how-to-spot-a-phising-email.jpg","type":"image\/jpeg"}],"author":"1-grid Team","twitter_card":"summary_large_image","twitter_creator":"@1grid_hosting","twitter_site":"@1grid_hosting","twitter_misc":{"Written by":"1-grid Team","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/"},"author":{"name":"1-grid Team","@id":"https:\/\/1grid.co.za\/blog\/#\/schema\/person\/bffb274b542eaf10c31940c6d4588265"},"headline":"Security Alert: How to Stay Safe from Phishing Attacks","datePublished":"2025-10-12T12:59:27+00:00","dateModified":"2025-10-22T13:18:48+00:00","mainEntityOfPage":{"@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/"},"wordCount":2118,"publisher":{"@id":"https:\/\/1grid.co.za\/blog\/#organization"},"image":{"@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/1grid.co.za\/blog\/wp-content\/uploads\/2025\/10\/how-to-spot-a-phising-email.jpg","articleSection":["Email","Guides"],"inLanguage":"en-ZA"},{"@type":"WebPage","@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/","url":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/","name":"7 Ways to Spot Phishing Emails: A Guide for South African SMEs","isPartOf":{"@id":"https:\/\/1grid.co.za\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/1grid.co.za\/blog\/wp-content\/uploads\/2025\/10\/how-to-spot-a-phising-email.jpg","datePublished":"2025-10-12T12:59:27+00:00","dateModified":"2025-10-22T13:18:48+00:00","description":"Beware of phishing scams targeting hosting customers. Learn how to spot fake emails and protect your account from fraud with our expert tips.","breadcrumb":{"@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/#breadcrumb"},"inLanguage":"en-ZA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/#primaryimage","url":"https:\/\/1grid.co.za\/blog\/wp-content\/uploads\/2025\/10\/how-to-spot-a-phising-email.jpg","contentUrl":"https:\/\/1grid.co.za\/blog\/wp-content\/uploads\/2025\/10\/how-to-spot-a-phising-email.jpg","width":750,"height":563,"caption":"how to spot a phishing email"},{"@type":"BreadcrumbList","@id":"https:\/\/1grid.co.za\/blog\/how-to-stay-safe-from-phishing-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/1grid.co.za\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Alert: How to Stay Safe from Phishing Attacks"}]},{"@type":"WebSite","@id":"https:\/\/1grid.co.za\/blog\/#website","url":"https:\/\/1grid.co.za\/blog\/","name":"1-grid Blog","description":"","publisher":{"@id":"https:\/\/1grid.co.za\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/1grid.co.za\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-ZA"},{"@type":"Organization","@id":"https:\/\/1grid.co.za\/blog\/#organization","name":"1-grid","url":"https:\/\/1grid.co.za\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-ZA","@id":"https:\/\/1grid.co.za\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/blog.1-grid.com\/wp-content\/uploads\/2018\/05\/Gridhost-Becomes-1-grid-1.png","contentUrl":"https:\/\/blog.1-grid.com\/wp-content\/uploads\/2018\/05\/Gridhost-Becomes-1-grid-1.png","width":1920,"height":1080,"caption":"1-grid"},"image":{"@id":"https:\/\/1grid.co.za\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/1grid.co.za\/","https:\/\/x.com\/1grid_hosting","https:\/\/www.instagram.com\/1grid_hosting\/","https:\/\/www.linkedin.com\/company\/1-grid\/"]},{"@type":"Person","@id":"https:\/\/1grid.co.za\/blog\/#\/schema\/person\/bffb274b542eaf10c31940c6d4588265","name":"1-grid Team","description":"Marketing Communication"}]}},"_links":{"self":[{"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/posts\/30983","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/comments?post=30983"}],"version-history":[{"count":25,"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/posts\/30983\/revisions"}],"predecessor-version":[{"id":31234,"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/posts\/30983\/revisions\/31234"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/media\/31211"}],"wp:attachment":[{"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/media?parent=30983"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/categories?post=30983"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/1grid.co.za\/blog\/wp-json\/wp\/v2\/tags?post=30983"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}