Phishing Emails
Modified on: Tue, Nov 22 2022 4:07 PMCurrent Phishing Scams Reported at Forsyth Tech
- None
What is a Phishing Email?
Forsyth Tech, as well as many other large organizations, are under more information security attacks than ever before. One of the most common types of attacks are phishing email scams. Phishing email scams are attempts by scammers to trick you into giving out personal information such as your bank account numbers, passwords and credit card numbers.
Phishing email scams come in all shapes and sizes. The best phishing emails will copy the look and feel of the organization or company they are impersonating to the point it becomes very difficult to recognize.
Example:
Here is an example of a phishing email that recently circulated:
How to Spot Phishing Emails
Check the sender information:
Check links before clicking:
Other indicators:
- May show the sender on behalf of someone and generally does not contain the sender's email.
- May not contain email signatures or any contact information.
- May contain bad grammar and capitalization errors.
- Generally require you to take quick action, such as verifying your account to prevent it from being deactivated
- Be particularly vigilant during holidays or during significant events since attackers heighten their activity during these times.
What to do if you get a phishing email
- If you suspect it may be a phishing email, ITS Support can review the message and advise if it is legitimate or not.
- If you know it is a phishing email, ITS Support can take measure to have the phishing attack blocked.
How to Protect Yourself
- Beware of messages that claim your account has been suspended
- Be suspicious of any email containing urgent requests for personal financial information
- Never click on a link in an email. Instead, always type the legitimate Web address of the site you want to reach directly into your Web browser.
- Be suspicious of email messages and other electronic communications from sources you do not know or recognize
- Use the latest versions of your operating system (OS) and applications
- Have the latest security software updates (patches) installed. This includes patches for your OS and applications
- Keep your anti-virus software up to date
- Report any suspicious emails