First, verify the sender’s authenticity. Phishing attacks are common and can be disguised as familiar contacts.