The above infographic is from Wombat Security.
The above infographic is from Rapid7.
The first infographic shows a flow chart of the decision process that we should all do our best to follow. The second scrutinizes an email, which we should consider. Remember that phishing attacks can also use SMS, social media, etc.