Avoid Phishing Attacks: Difference between revisions
No edit summary |
No edit summary |
||
Line 21: | Line 21: | ||
== Four Steps to Protect Yourself From Phishing == | == Four Steps to Protect Yourself From Phishing == | ||
<li>Protect your computer by using security software like [[Use Sophos Endpoint|Sophos Endpoint]]. Set the software to update automatically so it can deal with any new security threats. | <li>Protect your computer by using security software like [[Use Sophos Endpoint|Sophos Endpoint]]. Set the software to update automatically so it can deal with any new security threats. | ||
<li>Protect your mobile phone by setting software to update automatically. These updates could give you critical protection against security threats. | <li>Protect your mobile phone by setting software to update automatically. These updates could give you critical protection against security threats. |
Revision as of 10:23, 2 March 2020
A screencast is a digital recording of computer screen output, also known as a video screen capture, often containing audio narration. | |
Intended for Employees and Students | |
Categorized under Classroom technology and systems | |
Maintained by Matt Ringh | |
in need of review. |
What is "Phishing"?
Phishing emails and text messages often tell a story to trick you into clicking on a link or opening an attachment. They may
- say they’ve noticed some suspicious activity or log-in attempts
- claim there’s a problem with your account or your payment information
- say you must confirm some personal information
- include a fake invoice
- want you to click on a link to make a payment
- say you’re eligible to register for a government refund
- offer a coupon for free stuff
Four Steps to Protect Yourself From Phishing
- Something you have — like a passcode you get via text message or an authentication app.
- Something you are — like a scan of your fingerprint, your retina, or your face.
- Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.
What to do if you suspect a phishing attack?
Mark the email as Spam, and delete.