Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

What is Phishing?

...

These messages that entice you into taking an action, such as clicking on a malicious link, opening an infected attachment, or responding to a scam. Cyber criminals craft these convincinggood-looking emails and send them to millions of people around the world. The criminals do not know who will fall victim, they simply know that the more emails they send out, the more people they will have the opportunity chance to hack. In addition, cyber criminals are not limited to just email but will use other methods, such as instant messaging or social media posts.

...

You may not realize it, but you are a phishing target at work and at home. you and your devices are worth a tremendous amount of money to cyber criminals, and they will do anything they can to hack them. YOU are the most effective way to detect and stop phishing. If you identify an email you think is a phishing attack, or you are concerned you may have fallen victim, contact your help desk or security team immediatelyright away. To learn more about phishing or to demo the SANS Securing The Human phishing testing platform, please visit Security Awareness Website.

...

  • Email the Fredonia ITS Center immediate or call 716-673-3407.
  • If you entered your password, change it immediatelyright away.
  • If clicked on the link, but did not enter your password, please check that your computer security or anti virus program is on and up to date.
  • Depending on the type of phishing attempt, you may need to check you other online accounts (e.g. financial etc.).

...

  • Beware of messages that claim your account has been suspended
  • Be suspicious of any email containing urgent requests for personal financial information
  • Never click on a link in an email. Instead, always type the legitimate Web address of the site you want to reach directly into your Web browser.
  • Be suspicious of email messages and other electronic communications from sources you do not know or recognize
  • Use the latest versions of your operating system (OS) and applications
  • Have the latest security software updates (patches) installed. This includes patches for your OS and applications
  • Keep your anti-virus software up to date
  • Report any suspicious emails
  • Avoid and report phishing emails in Google  

    Avoid and report phishing emails

...