SDI Logo
Services
Industries
About SDI
Resources
IT Managed Services
Government
About Us
Blogs
Advisory & Consulting
Utilities
Locations
News
ServiceNow
Aviation
Leadership
Videos
Enterprise Data & AI
Transportation
History
White Papers
Enterprise Asset Management
Public Safety
Careers
Case Studies
Public Safety
Commercial Real Estate
Culture
Banking, Financial Services & Insurance
Diverse Partnerships
ArchiveLink
Xchange
Manufacturing
End-User Services & Support
Infrastructure Services

Search request

Search
Contact Us
Back to blog
Home
•
Blogs
•
Catch a Suspicious Email – Before It Catches You.

Catch a Suspicious Email – Before It Catches You.

On this page:
Heading

SDI's cybersecurity team offers user-friendly advice on managing common cyber threats.

Most business professionals are aware that malware and computer viruses can easily spread to unsuspecting users via e-mail. As threats become more sophisticated, what may look like a valid e-mail might contain a link to a website that can trick the recipient into giving up sensitive information or a disguised attachment that delivers a malicious payload.

Can you detect a suspicious email?

To help identify questionable emails, the SDI team points out the four indicators below that are typical red flags associated with malicious emails:

  • Significant grammatical errors.
  • Lack of a signature.
  • Requests for passwords. Note that you should not be required to enter YOUR own username or password. Documents that are protected are usually done so using only a password that the sender would apply.
  • Masked links. Links in e-mail that direct the user to a web page will display their actual URL when you hover your mouse pointer over the link. If in doubt, perform this check on the link.

Example: In the screen shot below, the e-mail appears genuine. Notice that the grammar is a bit off and there is no signature on the e-mail. Both should raise red flags.

While hovering over the link in the document (REVIEW DOCUMENT) notice that it sends the recipient off to a strange website:

Any links that look suspicious should be investigated before linking through.

It is important to note that suspicious emails should not be forwarded – which includes to your organization’s IT support team!  Talk to your internal IT contact to become familiar with your organization’s procedures for handling suspicious emails.

SDI offers comprehensive cybersecurity services - from initial vulnerability assessments through 24X7 cyber incident monitoring and response programs. The SDI cyber team develops enterprise cyber policies and procedures, provides vulnerability remediation services, and conducts employee cyber training to achieve our clients' target cybersecurity posture compliance.

Contact SDI for more information on how to protect your organization, starting with an initial enterprise vulnerability assessment.

‍

Read more

Latest Insights from SDI

Discover more insights

Stay connected with SDI Presence.

Receive our latest resources, press releases, and stay up-to-date on the latest news.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Blogs
•
May 19, 2026
From AI to Agentic AI: The Essential AI Glossary
Blogs
•
May 16, 2026
From AI Chaos to Enterprise Control: SDI’s Top Takeaways from Knowledge 2026
News
•
May 16, 2026
Xchange Marks Apprentice Week with Enterprise IT Projects for Peoples Gas and Northern Trust
News
•
May 15, 2026
SDI Presence Announces Technology Apprenticeship Partnership with Technology Association of Georgia’s TAG Education Collaborative
Blogs
•
April 29, 2026
Why Data & CMDB Readiness Is Critical for AI
Blogs
•
April 28, 2026
From Data Chaos to Clarity: Solving the Public Sector Data Problem for AI Success
Blogs
•
April 14, 2026
Top Takeaways from ACI's Airports@Work 2026: Navigating Complexity in Mission-Critical Operations
Blogs
•
April 1, 2026
The Future of Maintenance: Integrating Preventive and Predictive EAM in 2026 
News
•
March 31, 2026
SDI Presence Appoints LaDarius Jackson as Vice President of ServiceNow Delivery
Blogs
•
March 24, 2026
From Data Lake to Data Swamp: Why Bad Data Poisons Every Decision 
News
•
March 18, 2026
SDI Presence Joins Western Regional Innovation & Technology Alliance (WRITA)
Blogs
•
March 3, 2026
Running ServiceNow Where Failure Isn’t an Option
News
•
February 3, 2026
SDI Presence names George J. Sperekas II Account Executive for Illinois SLED market 
Blogs
•
February 3, 2026
Escaping the IT Upside Down: How to Stop Tech Chaos Before It Takes Over
Blogs
•
February 3, 2026
ServiceNow SKO 2026 Takeaways: Delivering Ambition at AI Speed 
Discover more insights

Ready to transform your IT operations?

Contact to learn how our IT Managed Services can benefit your organization
Work With Us
Footer Background Image
Stay Connected with SDI.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.

We'd love to hear from you! Please fill out the form and we'll get back to you as soon as possible.


[Placeholder text - Hubspot will create the error message]
[Placeholder text - HubSpot will replace this with form submitting text]
Thanks for submitting the form.
Services
IT Managed Services
Advisory & Consulting
ServiceNow
Enterprise Data & AI
Enterprise Asset Management
Public Safety
Xchange
Industries
Government
Utilities
Aviation
Transportation
Public Safety
Commercial Real Estate
Banking, Financial Services 

& Insurance
Manufacturing
About SDI
About Us
Locations
Leadership
History
Careers
Diverse Partnerships
Resources
Blogs
News
Videos
White Papers
Case Studies
X - TWITTER
INSTAGRAM
LINKEDIN
FACEBOOK
© 2026 SDI All rights reserved
Terms of Service
Privacy Policy
Website by Foursets with love