|Print This Page Email to a Friend|
This month’s security topic is phishing attacks. Phishing attacks are used to both solicit sensitive information directly as well as to entice victims into unknowingly downloading and installing malware. Over time, cyber thieves have become more sophisticated in their tactics making it more difficult to distinguish phishing e-mails, phone calls, and text messages from legitimate ones. The scams are commonly designed to appear to be from, among others:
How to Recognize Scams- Be aware of these warning signs:
Phishing Email Dos and Don’ts:
DO call a company that you received a suspicious email from to see if it is legitimate, but never use the phone number contained in the email. Check a recent statement from the company to get a legitimate phone number.
DO look for a digital signature/certificate as another level of assurance that senders are legitimate. Digitally signed messages will have a special image/icon at the subject.
DO adjust your spam filters to protect against unwanted spam.
DON’T ever send credit card or other sensitive information via email.
DON’T click the link. Instead, phone the company or conduct an Internet search for the company’s true web address.
DON’T open e-mail or attachments from unknown sources. Many viruses arrive as executable files that are harmless until you start running them.
Finally, DO use common sense. If you have any doubts, DON’T respond. Ask your department IT representative for assistance.
Also in this issue:
© 2017 USA Health System