If you’re worried about phishing emails or just want to be more secure, here’s how to identify and handle suspicious emails to keep your Jimdo account safe.
What is Phishing?
Phishing is a form of online fraud where scammers attempt to obtain personal data, such as passwords, credit card numbers, or other sensitive information, through fake messages. Phishing emails or messages often appear to come from trusted companies or individuals and put the recipient under pressure to act quickly. The goal is to gain the recipient’s trust so they click on links or reveal personal information.
Recognizing Phishing Emails
Phishing emails often look like regular messages from colleagues or well-known companies. Here are some common signs to help you spot suspicious emails and respond appropriately:
-
Suspicious Sender
Carefully check the sender’s email address. Phishing emails often come from addresses that are slightly altered or misspelled. If you’re using Jimdo Webmail, you can view the full email header by going to More > View full Header. There, under From, you can see the exact email address from which the message was sent.
If you're using a different email program, you can find instructions for locating email headers here.
Tip for Mobile Users
On mobile devices, the header can be accessed through the "Details" or "More options" feature in your email app. The steps vary depending on the app, so it’s helpful to look for a “View Header” option in the app’s settings. -
Unusual Language or Foreign Language
Another warning sign is the language used in the email. If you usually receive messages in German from a company but suddenly get one in English or another foreign language, it could be a phishing attempt. -
Alarming or Vague Language
General or urgent messages like “Your account will be deactivated” are often red flags for phishing. Legitimate companies usually address you personally and reference specific details. -
Grammar and Spelling Errors
Typos or poor grammar are often red flags. Legitimate companies pay attention to clear and accurate communication. -
Suspicious Links and Attachments
Hover over links to check the URL before clicking. Avoid unknown links and don’t download unexpected attachments. Tip for Mobile Users: On mobile devices, it can be harder to check URLs since there’s no easy way to hover. Instead, press and hold the link to preview the URL without opening it. This will help you see where the link leads without actually navigating to it. Always be cautious with unknown links or attachments, as they may pose a security risk. -
Requests for Personal Information
If an email asks for passwords, payment information, other sensitive details, or includes an unexpected invoice, be cautious. Reliable companies won’t ask for such information via email.
Here is an example with a non-Jimdo email address as the sender and the address in the payment link has nothing to do with Jimdo either.
What to Do if You Suspect Phishing
If you think an email might be a phishing attempt, you can take the following steps:
-
Don’t click or download anything
Avoid clicking on any links or downloading attachments. -
Verify the sender
Visit the company’s official website and use their contact information to confirm the email’s legitimacy. -
Check for unexpected invoices
Log in directly to your Jimdo account and go to the billing section to check for any open invoices. This way, you can ensure that all payment information comes directly from your account. -
Report the email
Mark the email as spam. This helps block similar emails in the future.
Additional Tips for Staying Safe
For added security, consider these steps:
-
Use Strong, Unique Passwords
Strong passwords are your first line of defense. A mix of letters, numbers, and symbols helps create a secure password. To make it easier, you can use a password generator or visit a reliable site that offers guidance on creating strong passwords. Many password managers also include generators to help create and securely store your passwords. -
Keep Your Software Up to Date
Regular updates close security gaps that phishing attempts may try to exploit.
By staying alert and following these steps, you can protect yourself and your data. If you need more help or have questions, our support team is here for you!