Suspicious Emails: 6 Signs and 60-Second Checklist What To Do

Not all cyber threats come through hacking or malware. Some of the most common, damaging attacks begin with something deceptively simple: a suspicious-looking email. Phishing scams - emails that impersonate NHS bodies, suppliers, or colleagues - are one of the most frequent causes of cyber breaches in healthcare. These emails aim to trick staff into clicking links, downloading attachments, or sharing sensitive data. The good news? You don’t need to be an IT expert to stop them. If your team knows what to look for and how to act fast, you can prevent a small mistake becoming a major incident. Here’s how to spot, stop and report a suspicious email - in under 60 seconds. 


This is a companion discussion topic for the original article at https://patient.info/doctor/information-governance-and-security/how-to-respond-to-a-suspicious-email-in-under-60-seconds