First Midwest BankFirst Midwest Bank logoArrow DownIcon of an arrow pointing downwardsArrow LeftIcon of an arrow pointing to the leftArrow RightIcon of an arrow pointing to the rightArrow UpIcon of an arrow pointing upwardsBank IconIcon of a bank buildingCheck IconIcon of a bank checkCheckmark IconIcon of a checkmarkCredit-Card IconIcon of a credit-cardFunds IconIcon of hands holding a bag of moneyAlert IconIcon of an exclaimation markIdea IconIcon of a bright light bulbKey IconIcon of a keyLock IconIcon of a padlockMail IconIcon of an envelopeMobile Banking IconIcon of a mobile phone with a dollar sign in a speech bubbleMoney in Home IconIcon of a dollar sign inside of a housePhone IconIcon of a phone handsetPlanning IconIcon of a compassReload IconIcon of two arrows pointing head to tail in a circleSearch IconIcon of a magnifying glassFacebook IconIcon of the Facebook logoLinkedIn IconIcon of the LinkedIn LogoXX Symbol, typically used to close a menu
Skip to nav Skip to content
FDIC-Insured - Backed by the full faith and credit of the U.S. Government

Six Common Phishing Tactics and How to Outsmart Them

By Kevin Novak, Chief Information Security Officer at Old National Bank

Phishing scams are among the most persistent and dangerous forms of cybercrime. Whether delivered via email, text message, phone call, or fake websites, phishing attacks aim to trick individuals into revealing sensitive information.

At Old National, we deploy advanced tools and training to help protect our clients and employees from phishing threats. Here are five common phishing tactics — and how to outsmart them.

  1. The “Urgent Action Required” Email

    • Pause and verify the content
    • Check the sender’s address
    • Contact the sender/company directly using known, good info
  1. Malicious Attachments in Emails

    • Don’t open unexpected attachments
    • Use antivirus/antimalware software
    • Enable email filtering
    • Report phishing whenever possible
  1. Malicious Links or Attachments in Texts

    • Don’t open attachments from unknown senders
    • Don’t open links from unknown senders
    • Block numbers from unknown senders
  1. Phone Calls from “Support,” “Fraud,” or “Security” Teams

    • Hang up and call back using a known, good number
    • Never share sensitive information, especially passwords or MFA codes
    • Report suspicious calls
  1. Spoofed Websites that Look Real

    • Double-check the website address/URL
    • Use known, good bookmarks or type the address manually
    • Look for HTTPS and a padlock icon (Lock with solid fill) in or near the address bar
    • Use caution when navigating from publicly posted QR Codes
  1. Social Media Impersonation

    • Verify the account
    • Don’t click links, send money, or share sensitive information
    • Report fake profiles

 

Final Thoughts

Phishing attacks are constantly evolving — but so are the tools and habits that can protect you. At Old National, we combine technology with education to help our clients stay safe.

 

Subscribe for Insights

Subscribe