What is Phishing?

 

Phishing usually comes in the form of an email that on the surface seems legit or from an acquaintance.  There is usually something in the email that suggests you either click on a link, visit a website, call a number, or respond back.  Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals do this by installing malicious software on your computer or stealing personal information off of your computer.  Cybercriminals will use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.

 

What does a phishing email message look like?

 

Seventeen  tips to spot phishing emails:

 

1.       Check for spelling mistakes and poor grammar

2.       Analyze the salutation (no generics)

3.       Beware of urgent or threatening language in the subject line (avoid the gotcha)

4.       Review the signature (look for contact details, legitimate sites will provide those)

5.       The message contains a mismatched url

6.   Urls contain a misleading domain name

7.   Offer seems too good to be true

8.   You didnít initiate the action

9.   Youíre asked to send money to cover expenses

10.   The message makes unrealistic threats

11.   The message appears to be from a government agency

12.   Something just doesnít look right

13.   Email urges you to take immediate action

14.   The email requests for personal information

15.   The email says youíve won a contest you didnít enter

16.   The email asks you to make a donation

17.  Email shows the source as a name and not a full email address

Friendly Advice

1.       Look but donít click links(hover your mouse)

2.     Donít click on attachments

3.       Donít give up personal information (they shouldnít ask)

4.       Donít trust the display name  (spoofing)

5.       Donít trust the header from email address

6.       Donít believe everything you see(spoofing)

7.   Turn off preview window

8.   Do not rely on anti-virus to protect you, be vigilant

9.   Delete emails that look suspicious or are from an unfamiliar source

 

 

Don't Be A Victim!