Here is a handy phishing flow chart that basically walks a user through the analysis of an email. It begins by identifying the sender and then checking consecutively if the email contains links or attachments and if it requests personal information.


Flowcharts are great because they illustrate step-by-step decision paths easy to understand and follow. It’s also very handy to show family or friends who have no idea how to identify a phishing attack.

Related News

Lindy Kyzer is the editor of ClearanceJobs.com. She loves the NISPPAC, social media, and the U.S. military. Have a conference, tip, or story idea to share? Email lindy.kyzer@clearancejobs.com. Interested in writing for ClearanceJobs.com? Learn more here.