{"id":25311,"date":"2025-10-02T14:11:54","date_gmt":"2025-10-02T14:11:54","guid":{"rendered":"https:\/\/1-grid.com\/knowledge\/?p=25311"},"modified":"2025-10-20T10:13:30","modified_gmt":"2025-10-20T10:13:30","slug":"how-to-spot-a-scam-email","status":"publish","type":"ht_kb","link":"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/","title":{"rendered":"How to Spot a Scam Email: Phishing, Spoofing and Red Flags"},"content":{"rendered":"\n<p>No one is immune to tricksters, so the better you can spot\u00a0a scam\u00a0email, the safer your inbox\u00a0remains.\u00a0\u00a0This guide helps you\u00a0distinguish between\u00a0<a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\"><strong>phishing<\/strong><\/a> and<strong> <a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-email-spoofing\/\">spoofing<\/a><\/strong>, spot red flags, and know what action to take.\u00a0<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"600\" src=\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2025\/10\/1-grid-Images-for-KB-Articles-1000-x-600-px-35.png\" alt=\"\" class=\"wp-image-33749\"\/><\/figure>\n<\/div>\n\n\n<div class=\"wp-block-ht-block-toc is-style-rounded htoc htoc--position-wide toc-list-style-plain\" data-htoc-state=\"expanded\"><span class=\"htoc__title\"><span class=\"ht_toc_title\">Table of Contents<\/span><span class=\"htoc__toggle\"><svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"16\" height=\"16\"><g fill=\"#444\"><path d=\"M15 7H1c-.6 0-1 .4-1 1s.4 1 1 1h14c.6 0 1-.4 1-1s-.4-1-1-1z\"><\/path><path d=\"M15 1H1c-.6 0-1 .4-1 1s.4 1 1 1h14c.6 0 1-.4 1-1s-.4-1-1-1zM15 13H1c-.6 0-1 .4-1 1s.4 1 1 1h14c.6 0 1-.4 1-1s-.4-1-1-1z\"><\/path><\/g><\/svg><\/span><\/span><div class=\"htoc__itemswrap\"><ul class=\"ht_toc_list\"><li class=\"\"><a href=\"#htoc-\">What Are Scam Emails?&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-111\">Phishing vs Spoofing: What Sets Them Apart&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-1111\">Key Red Flags to Watch Out For&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-1111111\">How to Inspect an Email&nbsp;<\/a><ul class=\"ht_toc_child_list\"><\/ul><\/li><li class=\"\"><a href=\"#htoc-11111111111111111\">What to Do When You Spot a Scam&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-11111111111111111111\">Prevention Tips and Best Practices<\/a><\/li><li class=\"\"><a href=\"#htoc-11111111111111111111111\">FAQs&nbsp;<\/a><\/li><li class=\"\"><a href=\"#htoc-1111111111111111111111111111\">Additional&nbsp;Resources&nbsp;<\/a><\/li><\/ul><\/div><\/div>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-\"><strong>What Are Scam Emails?&nbsp;<\/strong><\/h2>\n\n\n\n<p>Scam&nbsp;emails are fraudulent messages that aim to deceive you either by impersonating others (spoofing) or by tricking you into acting (phishing).&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-1\"><strong><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-email-spoofing\/\">Spoofing<\/a><\/strong>&nbsp;is when the sender&#8217;s identity is forged, making the mail appear to come from someone trusted (for instance, your bank or 1-grid).<\/li>\n\n\n\n<li id=\"htoc-11\"><strong><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noreferrer noopener\">Phishing<\/a><\/strong>\u00a0is when the\u00a0scam\u00a0tries to lure you into revealing sensitive information (passwords, credit cards) or clicking on malicious links,\u00a0all under false pretences.\u00a0<\/li>\n<\/ul>\n\n\n\n<p><strong>IMPORTANT:<\/strong>&nbsp;Although phishing often uses spoofing techniques, not all spoofed emails are phishing attacks, so it is important to know how to spot a scam email and which type it is.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-111\"><strong>Phishing vs Spoofing: What Sets Them Apart&nbsp;<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><tbody><tr><td><strong>Feature<\/strong>&nbsp;<\/td><td><strong>Phishing<\/strong>&nbsp;<\/td><td><strong>Spoofing<\/strong>&nbsp;<\/td><\/tr><tr><td>Goal&nbsp;<\/td><td>Trick you into disclosing data or credentials&nbsp;<\/td><td>Malicious link, form, or login page&nbsp;<\/td><\/tr><tr><td>Typical action&nbsp;<\/td><td>Content and recipient behaviour&nbsp;<\/td><td>Sanctioned email header impersonation&nbsp;<\/td><\/tr><tr><td>Relationship&nbsp;<\/td><td>Uses <strong><a href=\"https:\/\/www.kaspersky.com\/resource-center\/definitions\/what-is-social-engineering\">social engineering<\/a>&nbsp;<\/strong><\/td><td>Focuses on encryption and sender identity forgeries&nbsp;<\/td><\/tr><tr><td>Detection filter&nbsp;<\/td><td>Content and recipient behaviour&nbsp;<\/td><td>Impersonate the sender to bypass trust&nbsp;<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-1111\"><strong>Key Red Flags to Watch Out For&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-11111\">Mismatched sender display name vs email address.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-urgent-or-scare-tactics-your-account-will-be-closed\">Urgent or scare tactics (\u201cYour account will be closed\u201d).&nbsp;<\/li>\n\n\n\n<li id=\"htoc-unexpected-attachments-or-file-types-you-don-t-trust\">Unexpected attachments or file types you&nbsp;don\u2019t&nbsp;trust.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-links-that-don-t-match-the-sender-s-domain\">Links that&nbsp;don\u2019t&nbsp;match the sender\u2019s domain.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-poor-grammar-odd-formatting-odd-greetings\">Poor grammar, odd formatting, odd greetings.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-requests-for-passwords-or-personal-data-via-email\">Requests for passwords or personal data via email.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-111111\">Emails from known contacts but with strange content.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-1111111\"><strong>How to Inspect an Email&nbsp;<\/strong><\/h2>\n\n\n\n<p>It\u2019s\u00a0important to understand if it is a\u00a0<strong><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-email-spoofing\/\" target=\"_blank\" rel=\"noreferrer noopener\">spoofing<\/a>\u00a0<\/strong>or\u00a0<a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>phishing<\/strong><\/a>\u00a0attack, and what to look out for in the scam email to<strong>\u00a0<a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-prevent-email-spoofing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">protect yourself<\/a><\/strong>.\u00a0Here&#8217;s a list of things on how to spot a scam email.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"1600\" height=\"600\" src=\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2022\/04\/Copy-of-1-grid-Images-for-KB-Articles-1000-x-600-px-50.png\" alt=\"\" class=\"wp-image-33745\"\/><\/figure>\n<\/div>\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>1. The email contains poor spelling and\/or grammar.<\/strong><\/summary>\n<p id=\"htoc-11111111\">Phishing emails may&nbsp;contain&nbsp;poor spelling and grammar. Also look out for inconsistencies in the presentation of the email (e.g.&nbsp;the email may&nbsp;contain&nbsp;various font styles, font&nbsp;sizes&nbsp;and mismatched branding).&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>2. The email contains an impersonal greeting.<\/strong><\/summary>\n<p id=\"htoc-111111111\">Phishing emails will often&nbsp;contain&nbsp;greetings such as \u201cHi\u201d,&nbsp;\u201cHi &lt;email address&gt;\u201d,&nbsp;or \u201cDear Customer\u201d.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>3. The email asks for your personal information.<\/strong><\/summary>\n<p id=\"htoc-1111111111\">Nobody at a company will ask for your sensitive information (e.g.&nbsp;personally identifiable data, usernames and passwords, or banking information) by email or by phone.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>4. The email contains a mismatched URL. <\/strong><\/summary>\n<p id=\"htoc-11111111111\">Phishing emails often&nbsp;contain&nbsp;embedded links disguised as legitimate websites. Those embedded links&nbsp;probably won\u2019t&nbsp;direct you where&nbsp;you\u2019d&nbsp;expect them to. If it looks suspicious, hover your mouse over the top of the link to check if the hyperlinked address matches the one in the email.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>5. The email contains a misleading domain (e.g. 1grid.com) name.<\/strong><\/summary>\n<p id=\"htoc-111111111111\">Malicious actors often&nbsp;attempt&nbsp;to \u2018spoof\u2019 legitimate domain names to give the impression that embedded links will direct to legitimate websites. For example,&nbsp;1-grid.com&nbsp;is a legitimate email,&nbsp;whereas&nbsp;1grid.com&nbsp;is not.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>6. The email contains an unusual \u2018from\u2019 address.<\/strong><\/summary>\n<p id=\"htoc-1111111111111\">Malicious actors often&nbsp;attempt&nbsp;to \u2018spoof\u2019 legitimate email addresses to give the impression that the email is being sent from a legitimate&nbsp;organisation&nbsp;or person, while it is a scam email. <\/p>\n\n\n\n<h6 class=\"wp-block-heading\" id=\"htoc-111111111111111111111111111111\"><em>What does this tactic hide?<\/em><\/h6>\n\n\n\n<p id=\"htoc-11111111111111\">This tactic often hides unusual email addresses behind&nbsp;what appears to be a&nbsp;genuine sender name. If the email looks suspicious, hover your mouse over the&nbsp;sender&#8217;s&nbsp;name to see the email address from which the email was sent.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>7. The email creates a sense of urgency.<\/strong><\/summary>\n<p id=\"htoc-111111111111111\">Phishing emails may&nbsp;attempt&nbsp;to create urgency by warning you that your&nbsp;1-grid domain&nbsp;may expire or that your account has been&nbsp;suspended to encourage you to take immediate action.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>8. The email contains unrealistic threats.<\/strong><\/summary>\n<p id=\"htoc-1111111111111111\">Similarly, phishing emails may also&nbsp;attempt&nbsp;to create urgency by using intimidation to scare victims into&nbsp;disclosing&nbsp;sensitive information or making a payment.&nbsp;<\/p>\n\n\n\n<p id=\"htoc-1111111111111111111111111111111\"><\/p>\n<\/details>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111111111111111\"><strong>What to Do When You Spot a Scam&nbsp;<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-111111111111111111\"><strong>Do not click <\/strong>any links or download attachments.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-mark-the-email-as-spam-or-phishing-in-your-email-client\">Next, <strong>mark<\/strong> the email as spam or phishing in your&nbsp;email&nbsp;client.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-forward-the-suspicious-email-with-full-headers-to-1-grid-support-for-review\">Then,<strong> forward<\/strong> the suspicious email (with full headers) to 1-grid Support for review (if it is an impersonation of 1-grid) or to your IT team.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-if-you-entered-any-credentials-change-them-immediately-and-enable-two-factor-authentication\">If you entered any credentials, <strong>change<\/strong> them&nbsp;immediately&nbsp;and then<strong> enable<\/strong> two-factor authentication.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-1111111111111111111\"><strong>Warn others<\/strong> in your team or network if applicable.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111111111111111111\"><strong>Prevention Tips and Best Practices<\/strong><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li id=\"htoc-111111111111111111111\">Use authentication protocols (<a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-enable-dkim-and-spf-on-your-mail-domain\/\"><strong>SPF<\/strong><\/a>, <a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-enable-dkim-and-spf-on-your-mail-domain\/\"><strong>DKIM<\/strong><\/a>, <a href=\"https:\/\/1grid.co.za\/knowledge\/cpanel-how-to-add-dmarc-record\/\"><strong>DMARC<\/strong><\/a>) so spoofed emails are more likely to be blocked (see&nbsp;<em><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-prevent-email-spoofing-attacks\/\"><strong>How to Prevent Email Spoofing Attacks<\/strong><\/a><\/em>).&nbsp;<\/li>\n\n\n\n<li id=\"htoc-keep-your-dns-records-clean-and-up-to-date\">Keep your DNS records clean and up to date.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-use-reputable-antivirus-and-anti-phishing-tools\">Use <strong><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-prevent-email-spoofing-attacks\/\">reputable antivirus<\/a> <\/strong>and anti-phishing tools.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-educate-yourself-and-your-team-about-scam-types\">Educate yourself and your team about&nbsp;scam&nbsp;types.&nbsp;<\/li>\n\n\n\n<li id=\"htoc-1111111111111111111111\">Regularly&nbsp;monitor&nbsp;email logs or <strong><a href=\"https:\/\/1grid.co.za\/knowledge\/cpanel-how-to-add-dmarc-record\/\">DMARC<\/a> <\/strong>reports for anomalies.&nbsp;<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111111111111111111111\"><strong>FAQs&nbsp;<\/strong><\/h2>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>I got an email that looks exactly like one from 1-grid. How do I know if&nbsp;it\u2019s&nbsp;fake?<\/strong><\/summary>\n<p id=\"htoc-111111111111111111111111\">Check the sender\u2019s actual email, inspect full headers, then verify SPF\/DKIM results, and look for subtle red flags like typos or unusual requests. It&#8217;s important to know how to spot a scam email before taking any action on it.<br><br>Official emails will always only come from \u201c<strong>1-grid.com<\/strong>\u201d, but if you are ever unsure, please reach out to our Support Team for clarity.&nbsp;<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Can I trust a link if the display text looks normal?<\/strong><\/summary>\n<p id=\"htoc-1111111111111111111111111\">Not always. Always hover or inspect link targets. Attackers can display normal text but link to malicious sites.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>What if the spoofed email is just spam and not phishing?<\/strong><\/summary>\n<p id=\"htoc-even-spam-with-spoofed-identities-is-dangerous-as-it-may-lead-to-phishing-later-treat-spoofed-emails-with-caution\">Even spam with <a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-email-spoofing\/\"><strong>spoofed<\/strong> <\/a>identities is dangerous, as it may lead to <a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-phishing-how-it-works-and-how-to-protect-yourself\/\"><strong>phishing<\/strong><\/a> later. Treat spoofed emails with caution.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>Does marking as spam protect me fully?<\/strong><\/summary>\n<p id=\"htoc-11111111111111111111111111\">It helps train your email provider\u2019s filters, but it&nbsp;doesn\u2019t&nbsp;fix domain-level issues. Always use authentication and best practices.<\/p>\n<\/details>\n\n\n\n<details class=\"wp-block-details is-layout-flow wp-block-details-is-layout-flow\"><summary><strong>How often should I review DNS and email authentication settings?<\/strong><\/summary>\n<p id=\"htoc-111111111111111111111111111\">At least annually, or whenever you add new services, domains, or email providers.<\/p>\n<\/details>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-1111111111111111111111111111\"><strong>Additional&nbsp;Resources&nbsp;<\/strong><\/h2>\n\n\n\n<p><strong><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-prevent-email-spoofing-attacks\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Prevent Email Spoofing Attacks<\/a>&nbsp;<br><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-email-spoofing\/\" target=\"_blank\" rel=\"noreferrer noopener\">What Is Email Spoofing? How It Works and How to Protect Yourself&nbsp;<\/a>&nbsp;<br><a href=\"https:\/\/1grid.co.za\/knowledge\/?s=email+headers&amp;ht-kb-search=1&amp;lang=\" target=\"_blank\" rel=\"noreferrer noopener\">Email Headers FAQs<\/a>&nbsp;<br><a href=\"https:\/\/1grid.co.za\/knowledge\/how-to-enable-dkim-and-spf-on-your-mail-domain\/\" target=\"_blank\" rel=\"noreferrer noopener\">How to Enable DKIM and SPF on Your Mail Domain<\/a>&nbsp;&nbsp;<br><a href=\"https:\/\/1grid.co.za\/knowledge\/why-ssl-the-purpose-of-using-ssl-certificates\/\" target=\"_blank\" rel=\"noreferrer noopener\">Why SSL? The Purpose of Using SSL Certificates<\/a>&nbsp;&nbsp;<br><a href=\"https:\/\/1grid.co.za\/knowledge\/settings-to-configure-your-1grid-email-accounts-across-devices\/\" target=\"_blank\" rel=\"noreferrer noopener\">Settings to Configure Your 1-grid Email Accounts Across Devices<\/a>&nbsp;&nbsp;<br><a href=\"https:\/\/1grid.co.za\/knowledge\/what-is-a-domain-name-server-dns\/\" target=\"_blank\" rel=\"noreferrer noopener\">What is a Domain Name Server (DNS)?<\/a>&nbsp;<br><a href=\"https:\/\/1grid.co.za\/knowledge\/?s=mailchannels&amp;ht-kb-search=1&amp;lang=\" target=\"_blank\" rel=\"noreferrer noopener\">MailChannels FAQs<\/a>&nbsp;<br><a href=\"https:\/\/1grid.co.za\/knowledge\/?s=spamtitan&amp;ht-kb-search=1&amp;lang=\" target=\"_blank\" rel=\"noreferrer noopener\">SpamTitan FAQs<\/a>&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"htoc-11111111111111111111111111111\"><strong>Need Additional Support?&nbsp;<\/strong><\/h2>\n\n\n\n<p><strong>We&#8217;re&nbsp;Here to&nbsp;<\/strong><a href=\"https:\/\/1grid.co.za\/knowledge\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>Help<\/strong><\/a><strong>:<\/strong>&nbsp;<\/p>\n\n\n\n<p>Receiving and handling a spoofing or phishing scam email&nbsp;doesn\u2019t&nbsp;have to be scary with this easy-to-reference guide. Stuck? Contact our Support Team for guidance (<a href=\"https:\/\/1grid.co.za\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>https:\/\/1grid.co.za\/contact-us\/<\/strong><\/a>).&nbsp;We&#8217;re&nbsp;ready to see how we can help!&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>No one is immune to tricksters, so the better you can spot\u00a0a scam\u00a0email, the safer your inbox\u00a0remains.\u00a0\u00a0This guide helps you\u00a0distinguish between\u00a0phishing and spoofing, spot red flags, and know what action to take.\u00a0 What Are Scam Emails?&nbsp; Scam&nbsp;emails are fraudulent messages that aim to deceive you either by impersonating others (spoofing)&#8230;<\/p>\n","protected":false},"author":21,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"ht-kb-category":[1173],"ht-kb-tag":[1341,305,307,336,480,736,1477,877,1485,891,942,945,946],"class_list":["post-25311","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-email","ht_kb_tag-cybersecurity","ht_kb_tag-dkim","ht_kb_tag-dns","ht_kb_tag-email","ht_kb_tag-how-to","ht_kb_tag-phinishing","ht_kb_tag-phishing","ht_kb_tag-scam","ht_kb_tag-scam-detection","ht_kb_tag-security","ht_kb_tag-spf","ht_kb_tag-spoofing","ht_kb_tag-spot"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Spot a Scam Email: Phishing, Spoofing and Red Flags - 1-grid Knowledge Base<\/title>\n<meta name=\"description\" content=\"Learn how to spot a scam email like phishing, spoofing, and red flags. Identify threats in your inbox and protect your account.\" \/>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Spot a Scam Email: Phishing, Spoofing and Red Flags - 1-grid Knowledge Base\" \/>\n<meta property=\"og:description\" content=\"Learn how to spot a scam email like phishing, spoofing, and red flags. Identify threats in your inbox and protect your account.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\" \/>\n<meta property=\"og:site_name\" content=\"1-grid Knowledge Base\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/1grid.co.za\/\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-20T10:13:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2025\/10\/1-grid-Images-for-KB-Articles-1000-x-600-px-35.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:site\" content=\"@1grid_hosting\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\",\"name\":\"How to Spot a Scam Email: Phishing, Spoofing and Red Flags - 1-grid Knowledge Base\",\"isPartOf\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#website\"},\"datePublished\":\"2025-10-02T14:11:54+00:00\",\"dateModified\":\"2025-10-20T10:13:30+00:00\",\"description\":\"Learn how to spot a scam email like phishing, spoofing, and red flags. Identify threats in your inbox and protect your account.\",\"breadcrumb\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/1grid.co.za\/knowledge\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Spot a Scam Email: Phishing, Spoofing and Red Flags\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#website\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/\",\"name\":\"1-Grid Domain Hosting Knowledge Base\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/1grid.co.za\/knowledge\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#organization\",\"name\":\"1-Grid Domain Hosting Knowledge Base\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg\",\"contentUrl\":\"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg\",\"width\":100,\"height\":100,\"caption\":\"1-Grid Domain Hosting Knowledge Base\"},\"image\":{\"@id\":\"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/1grid.co.za\/\",\"https:\/\/twitter.com\/1grid_hosting\",\"https:\/\/www.instagram.com\/1grid_hosting\/\",\"https:\/\/za.linkedin.com\/company\/1-grid\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Spot a Scam Email: Phishing, Spoofing and Red Flags - 1-grid Knowledge Base","description":"Learn how to spot a scam email like phishing, spoofing, and red flags. Identify threats in your inbox and protect your account.","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"How to Spot a Scam Email: Phishing, Spoofing and Red Flags - 1-grid Knowledge Base","og_description":"Learn how to spot a scam email like phishing, spoofing, and red flags. Identify threats in your inbox and protect your account.","og_url":"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/","og_site_name":"1-grid Knowledge Base","article_publisher":"https:\/\/www.facebook.com\/1grid.co.za\/","article_modified_time":"2025-10-20T10:13:30+00:00","og_image":[{"url":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2025\/10\/1-grid-Images-for-KB-Articles-1000-x-600-px-35.png"}],"twitter_card":"summary_large_image","twitter_site":"@1grid_hosting","twitter_misc":{"Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/","url":"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/","name":"How to Spot a Scam Email: Phishing, Spoofing and Red Flags - 1-grid Knowledge Base","isPartOf":{"@id":"https:\/\/1grid.co.za\/knowledge\/#website"},"datePublished":"2025-10-02T14:11:54+00:00","dateModified":"2025-10-20T10:13:30+00:00","description":"Learn how to spot a scam email like phishing, spoofing, and red flags. Identify threats in your inbox and protect your account.","breadcrumb":{"@id":"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/1grid.co.za\/knowledge\/how-to-spot-a-scam-email\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/1grid.co.za\/knowledge\/"},{"@type":"ListItem","position":2,"name":"How to Spot a Scam Email: Phishing, Spoofing and Red Flags"}]},{"@type":"WebSite","@id":"https:\/\/1grid.co.za\/knowledge\/#website","url":"https:\/\/1grid.co.za\/knowledge\/","name":"1-Grid Domain Hosting Knowledge Base","description":"","publisher":{"@id":"https:\/\/1grid.co.za\/knowledge\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/1grid.co.za\/knowledge\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/1grid.co.za\/knowledge\/#organization","name":"1-Grid Domain Hosting Knowledge Base","url":"https:\/\/1grid.co.za\/knowledge\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/","url":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg","contentUrl":"https:\/\/1grid.co.za\/knowledge\/wp-content\/uploads\/2023\/01\/1-grid-logo-color.svg","width":100,"height":100,"caption":"1-Grid Domain Hosting Knowledge Base"},"image":{"@id":"https:\/\/1grid.co.za\/knowledge\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/1grid.co.za\/","https:\/\/twitter.com\/1grid_hosting","https:\/\/www.instagram.com\/1grid_hosting\/","https:\/\/za.linkedin.com\/company\/1-grid"]}]}},"_links":{"self":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25311","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/users\/21"}],"replies":[{"embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/comments?post=25311"}],"version-history":[{"count":5,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25311\/revisions"}],"predecessor-version":[{"id":33867,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb\/25311\/revisions\/33867"}],"wp:attachment":[{"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/media?parent=25311"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb-category?post=25311"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/1grid.co.za\/knowledge\/wp-json\/wp\/v2\/ht-kb-tag?post=25311"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}