Hi All,
This is a great article from the folks @ https://www.staysafeonline.org/ – Its worth a quick read. Its super important that if you get an attachment in the email, I need you to think before you click it. Were you expecting it? Do you know who sent it? We have seen a large increase in malware on PC’s because someone emailed a person their paycheck in a .exe file, even though they never got a pay check in an .exe – ever. If you are unsure if the attachment is real or not, assume its fake – and ask a tech for help.
SPAM & PHISHINGCybercriminals have become quite savvy in their attempts to lure people in and get you to click on a link or open an attachment.The email they send can look just like it comes from a financial institution, e-commerce site, government agency or any other service or business. It often urges you to act quickly, because your account has been compromised, your order cannot be fulfilled or another matter. If you are unsure whether an email request is legitimate, try to verify it with these steps:
Spam
Spam is the electronic equivalent of junk mail. The term refers to unsolicited, bulk – and often unwanted – email.Here are ways to reduce spam:
Phishing
Phishing attacks use email or malicious websites (clicking on a link) to collect personal and financial information or infect your machine with malware and viruses. Spear Phishing Spear phishing is highly specialized attacks against a specific target or small group of targets to collect information or gain access to systems.For example, a cybercriminal may launch a spear phishing attack against a business to gain credentials to access a list of customers. From that attack, they may launch a phishing attack against the customers of the business. Since they have gained access to the network, the email they send may look even more authentic and because the recipient is already customer of the business, the email may more easily make it through filters and the recipient maybe more likely to open the email. The cybercriminal can use even more devious social engineering efforts such as indicating there is an important technical update or new lower pricing to lure people. Spam & Phishing on Social Networks Spam, phishing and other scams aren’t limited to just email. They’re also prevalent on social networking sites. The same rules apply on social networks: When in doubt, throw it out. This rule applies to links in online ads, status updates, tweets and other posts.Here are ways to report spam and phishing on social networks:
How Do You Avoid Being a Victim?
What to Do if You Think You are a Victim?
Additional Resources:
Protect Yourself with these STOP. THINK. CONNECT. Tips:
|