Ñý¼§Ö±²¥

Phish and Tips

Our biggest tip is to decrease the chances of being scammed by learning more about phishing and the signs of a scam.

Know the Scammer's Tactics

Scammers typically use a combination of three different things to get you to either reply to it, click on something or interact in some way:

  1. Pretending to be a legitimate business.
  2. Creating a sense of urgency!
  3. Offering you a prize or reward.

Scammers work hard at trying to fool you into giving them your credentials. The best way for them to do this is to make that email look legitimate and prompt you to do something. They may even try to use your emotions against you, such as attempting to threaten you or convince you that they represent a charitable cause.

 

Help Prevent Phishing Attacks

You are your own best defense against phishing attacks! Here are a few ways for you to keep yourself safe from these types of messages.

  • Monitor your online accounts regularly.
  • Keep your browser updated.
  • Be aware of pop-up windows.
  • Take advantage of reporting tools that help block phishing attacks.

 

Tips to #BECYBERSMART

DO:

  • Check the sender's name AND email address.
  • Be suspicious of emails marked "urgent."
  • Notice mistakes in spelling and grammar that seem out of character.
  • Beware of generic greetings, for example: "dear sir/ma'am, dear user,"
  • Read emails carefully. Phishing emails may be alarming or sound “too good to be true.â€
  • Verify the person calling you is who they say they are... don't get vished!
  • Hover over the link before you click to ensure it has a secure URL. Look for https:// and avoid http://.
  • Protect your personal information. If people contacting you have key details from your life—your job title, email addresses, full name, and more that you may have published online somewhere—they can attempt a direct spear phishing attack on you.

DON'T:

  • Don't rush when reading an email from a sender you do not recognize.
  • Don't give out personal or financial information based on an email request.
  • Don't trust links or attachments in unsolicited emails.
  • Don't reuse passwords across multiple accounts.
  • Don't share secure information via email unless it is encrypted.
  • Don't interact with text messages, calls or emails from unfamiliar sources.

REMEMBER:

  • Spoofed emails are phishing emails that appear to come from a known sender.
  • If an unverified caller asks for sensitive information, disconnect and call the company back at a known, published number.
  • Report any suspicious emails, texts, or calls to phish@kent.edu. This helps protect you, your colleagues, and the entire Ñý¼§Ö±²¥ State University community.
  • Phishing attacks can use emails or malicious websites to infect your machine with malware and viruses to collect personal and financial information.
  • Phishing emails may appear to come from a real financial institution, e-commerce site, government agency, etc. The email may request personal information such as account numbers, passwords, or Social Security numbers. When you respond with this information or click on a malicious link, attackers may be able to access your accounts or steal your identity.
  • Cyber criminals can also use social engineering with these details to try to manipulate you into skipping normal security protocols.
  • How to report phishing attempts: forward the message to phish@kent.edu.