COVID-19 and Cyber-crime
Cyber-criminals use Natural disasters and Crisis situations to prey on victims. COVID-19 is no different. Click here for information on COVID-19 and Cyber-crime.
Phishing uses fake emails or websites to collect usernames and passwords as well as bank account numbers, social security numbers, and other personal information. These emails and websites may look real, but they are actually designed to fool you into divulging information.
You can identify a phishing scam by looking for email messages that:
Always remember that legitimate companies and organizations will never ask for passwords, social security numbers, and other sensitive data via email.
Below is an example of a typical phishing email with notes on the various elements that may help you recognize other attempts to trick you.
Be aware that some phishing emails are better crafted than this one and may use stolen graphics to actually look like emails from your bank, work or other location. As a result, you should carefully read and inspect any email instructing you to do anything and when in doubt, ask your manager or our helpdesk!
This presentation on cybersecurity will help you develop an intuition for spotting phishing emails and cover much more about keeping your technology secure. Check out the recorded session here: https://www.youtube.com/playlist?list=PLrRuB9O5HO7SaCBerBn3ddX6HJVdCwEC5.
We recently shared a short training video on our Information Technology YouTube channel on an example phishing attempt.
We also have a short Cybersecurity training course in Canvas in which you can self-enroll and learn more. Go to https://courses.letu.edu/enroll/HE7FG9 to begin.