New breach prompts widespread phishing alerts

David Pollino
Posted by David Pollino

Unfortunately you don’t have to look very far for signs major hacking incidents; I see them daily while monitoring news reports. This week DocuSign was one of the brands that became a victim.

Young business woman leaning in to look more closely at what's on her computer monitor.As you may have read, hackers breached the electronic-signature company’s systems and stole email addresses that were soon targeted with phishing emails. The actual number of stolen addresses is still unclear, according to Inc. But what is clear is the breach should be a reminder to us all about being vigilant while using email. (Full disclosure: Bank of the West is a customer of DocuSign.)

Follow updates from DocuSign

First, for customers of DocuSign or those who have used one of its products, you can check on updates and alerts from the company on its site. Similarly, business owners who use DocuSign can follow alerts at its Trust Center for questions or guidance on sharing relevant information with customers.

Second, customers who receive an email that looks like it may come from DocuSign (but actually from a domain such as “,” “” or “”) should be very careful. Do not open any attachments. Rather than opening the email or clicking any link in it, recipients should log in to their DocuSign account to access any relevant documents to sign.

Tips for identifying a phishing email

Here are several signs to help identify and avoid a phishing attempt.

1. If you don’t recognize the sender of the email, be on alert. If the sender of a DocuSign envelope is unknown and you doubt the email’s authenticity, look for a unique code — included in all DocuSign envelopes — at the bottom of the notification email.

  • If there is a security code, access your documents directly from the DocuSign site, using the unique security code.
  • If there is no security code, do not click on links or open attachments in the email. Report the incident ASAP to

2. Check links before you click. You can hover over the link with your mouse to see the URL in your browser or status bar. The best way to protect yourself is to go to the vendor’s official site — whether it’s DocuSign or another company — and navigate to the appropriate area rather than clicking on a link.

3. If you receive a questionable email, contact the business directly to verify the message. For example, an email may have a generic greeting like “Dear DocuSign customer,” which can be suspicious if legitimate messages are usually personalized.

4. Check for grammar errors, misspellings, or missed words. These sorts of mistakes may actually help fraudsters avoid spam filters.

5. Beware of emails that are made to look like websites, with fields inviting you to enter personal information, such as a login ID, password, or Social Security number.

For more, please see my post “Don’t take the bait: Tips to help prevent phishing” or this brief video on phishing.

Reminder: All comments are moderated prior to publication and must follow our Community Guidelines.

Submit an Idea

[contact-form-7 id="32" title="Share An Idea"]

You are leaving the Bank of the West Change Matters site. Please be aware: The website you are about to enter is not operated by Bank of the West. Bank of the West does not endorse the content of this website and makes no warranty as to the accuracy of content or functionality of this website. The privacy and security policies of the site may differ from those practiced by Bank of the West. To proceed to this website, click OK, or hit Cancel to remain on the Bank of the West Change Matters site.