Back

What is a Phishing Attack and Tips for Protecting Yourself

Cybercriminals are using social engineering to craft emails that appear as though they have been sent from a legitimate organization or known individual. The purpose of these emails is to either gain access to your device or trick you into revealing personal information like credit card numbers or passwords. These emails often entice users to click on a link or open an attachment containing malicious code. This type of social engineering has been termed “phishing,” because - like fishing in a lake - cybercriminals are casting their reels, hoping you take the bait.

Best Practices to Protect Yourself

Email

  • Be careful when clicking directly on links in emails, even if the sender appears to be known; attempt to verify web addresses independently. Check out this PC World article for tips on verifying links.
  • Exercise caution when opening email attachments. Be particularly wary of ZIP, EXE, or DMG file attachments. As a best practice, NEVER open an attachment from an email.
  • Avoid revealing personal or financial information in email, and do not respond to email solicitations for this information. This includes following links sent in email.
  • Be suspicious of unsolicited email messages from individuals asking for sensitive information.
  • If you are unsure whether an email request is legitimate, try to verify it by contacting the company directly. Do not use contact information provided on a website connected to the request; instead, check previous statements for contact information.

Websites

  • Pay attention to the URL (address) of a website. Malicious websites may look identical to a legitimate site, but the URL may use a variation in spelling or a different domain (e.g., .com vs. .net). This is one of the most common ways used to trap people.
  • Even for legitimate purposes, be cautious about sending sensitive information over the Internet before checking a website's security. This AVG article has tips for verifying a site’s security.
  • Update web browsers regularly to ensure known security holes and vulnerabilities have been patched.

Computers and Other Devices

  • Install application and operating system updates regularly. Outdated applications and operating systems are vulnerable and the target of most attacks. Read this Norton Antivirus article on the importance of installing updates.
  • Install and maintain anti-virus software, firewalls, and email filters.
  • Perform frequent backups of your computer and files and verify those backups regularly. If your system becomes compromised, you can restore it to its previous state.
  • The safest practice is to store backups on a separate device that cannot be accessed from a network or the Internet.

Additional Resources:

Angeliki Constantine
Posts: 1
Stars: 0
Date: 9/19/18
Meredyth Houpos
Posts: 2
Stars: 1
Date: 9/12/18
Christian Gonzalez
Posts: 76
Stars: 8
Date: 9/5/18
Steven Christoforou
Posts: 31
Stars: 0
Date: 7/31/18
George P. Nassos
Posts: 1
Stars: 0
Date: 7/19/18
Family Care
Posts: 8
Stars: 0
Date: 7/10/18
Rev. Dr. Tony Vrame
Posts: 28
Stars: 1
Date: 6/27/18
Elaina Karayannis
Posts: 2
Stars: 0
Date: 5/20/18
Fr. Alexander Goussetis
Posts: 2
Stars: 0
Date: 4/12/18
George Tsongranis
Posts: 1
Stars: 0
Date: 2/13/18