Jump to content

Avoid Phishing Attacks: Difference between revisions

no edit summary
No edit summary
No edit summary
(11 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{abox
{{abox
  | name          = How do I avoid phishing attacks?
  | name          = How do I avoid phishing attacks?
  | summary      = A screencast is a digital recording of computer screen output, also known as a video screen capture, often containing audio narration.
  | summary      = How To Recognize and Avoid Phishing Scams.
  | for_employees = Y
  | for_employees = Y
  | for_students  = Y
  | for_students  = Y
  | for_parents  =  
  | for_parents  =  
  | cat1          =  Classroom technology and systems
  | cat1          =  Classroom Technology and Systems
  | cat2          =
  | cat2          =
  | maintained    = MR
  | maintained    = MR
  | year          = 2019-2020
  | year          = 2022-2023
}}
}}
== What is "Phishing"? ==
== What is "Phishing"? ==
Line 21: Line 21:


== Four Steps to Protect Yourself From Phishing ==
== Four Steps to Protect Yourself From Phishing ==
<ol>
 
<li>Protect your computer by using security software like [[Use Sophos Endpoint|Sophos Endpoint]]. Set the software to update automatically so it can deal with any new security threats.
#Protect your computer by using security software like [[Use Sophos Endpoint|Sophos Endpoint]]. Set the software to update automatically so it can deal with any new security threats.
<li>Protect your mobile phone by setting software to update automatically. These updates could give you critical protection against security threats.
#Protect your mobile phone by setting software to update automatically. These updates could give you critical protection against security threats.
<li>Protect your accounts by using multi-factor authentication. Some accounts offer extra security by requiring two or more credentials to log in to your account. This is called multi-factor authentication. The additional credentials you need to log in to your account fall into two categories:
#Protect your accounts by using multi-factor authentication. Some accounts offer extra security by requiring two or more credentials to log in to your account. This is called multi-factor authentication. The additional credentials you need to log in to your account fall into two categories:
*Something you have — like a passcode you get via text message or an authentication app.
#*Something you have — like a passcode you get via text message or an authentication app.
*Something you are — like a scan of your fingerprint, your retina, or your face.
#*Something you are — like a scan of your fingerprint, your retina, or your face.
*Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.
#*Multi-factor authentication makes it harder for scammers to log in to your accounts if they do get your username and password.
<li>Protect your data by backing it up. Back up your data and make sure those backups aren’t connected to your home network. You can copy your computer files to an external hard drive or cloud storage. Back up the data on your phone, too. <br clear="all">
#Protect your data by backing it up. Back up your data and make sure those backups aren’t connected to your home network. You can copy your computer files to an external hard drive or cloud storage. Back up the data on your phone, too.
<br clear="all">
 
== What to do if you suspect a phishing attack? ==
== What to do if you suspect a phishing attack? ==
[https://support.google.com/mail/answer/1366858?co=GENIE.Platform%3DDesktop&hl=en Mark the email as Spam], and delete.
[https://support.google.com/mail/answer/1366858?co=GENIE.Platform%3DDesktop&hl=en Mark the email as Spam], and delete.
== What is "Spear Phishing" ==
Spear phishing is an email or electronic communications scam targeted towards a specific individual, school or business. Although often intended to steal data for malicious purposes, cybercriminals may also intend to install malware on a targeted user’s computer.
== How does "Spear Phishing" work? ==
An email arrives, apparently from a trustworthy source, but instead it leads the unknowing recipient to a bogus website full of malware. These emails often use clever tactics to get victims' attention.
One employee mistake can have serious consequences. With stolen data, fraudsters can reveal sensitive information. In addition, spear phishing attacks can deploy malware to hijack computers, organizing them into enormous networks called botnets that can be used for denial of service attacks.
== How to protect yourself from spear phishing ==
To fight spear phishing scams, employees need to be aware of the possibility of bogus emails landing in their inbox.
2,227

edits