Email Phishing

Don't be a Phisher's Catch of the Day

 

Cybercriminals are very good at getting personal information from unsuspecting victims, and the methods are getting more sophisticated as technology evolves. Protect against cyber threats by learning about security features available on the equipment and software you use. Apply additional layers of security to your devices – like Multi-Factor Authentication (MFA)– to better protect your personal information. If you haven`t already signed up for MFA, visit securemyaccount.kent.edu!

 

HOW CYBER CRIMINALS LURE YOU IN

 

Phishing emails are becoming more sophisticated, follow basic security measures daily when going through your email:

  • Check for wording that tries to get a quick emotional reaction, such as URGENT and ACCOUNT CANCELATION. Phrases such as these often appear in the subject line.
  • Watch for typos and grammatical errors.
  • Hover over any links to check where the link leads.
  • Be cautious of any email that requests personal or confidential information, or some form of money/gift card transfer.
  • Stop and ask yourself if this is the type of email you would normally receive from the sender.
  • Remember, please report any suspicious emails to phish@kent.edu.

SIMPLE TIPS FOR YOU TO SECURE IT.

  • Play hard to get with strangers. Links in email and online posts are often the way cybercriminals compromise your computer. If you’re unsure who an email is from—even if the details appear accurate—do not respond, and do not click on any links or attachments found in that email. Be cautious of generic greetings such as “Hello Bank Customer,” as these are often signs of phishing attempts. 
  • Think before you act. Be wary of communications that implore you to act immediately. Many phishing emails attempt to create a sense of urgency, causing the recipient to fear their account or information is in jeopardy. If you receive a suspicious email that appears to be from someone you know, reach out to that person directly on a separate secure platform. If the email comes from an organization but still looks “phishy,” reach out to them via customer service to verify the communication.
  • Protect your personal information. If people contacting you have key details from your life—your job title, multiple email addresses, full name, and more that you may have published online somewhere—they can attempt a direct spear-phishing attack on you. Cyber criminals can also use social engineering with these details to try to manipulate you into skipping normal security protocols.
  • Be wary of hyperlinks. Avoid clicking on hyperlinks in emails and hover over links to verify authenticity. Also ensure that URLs begin with “https.” The “s” indicates encryption is enabled to protect users’ information.
  • Double your login protection. Enable multi-factor authentication (MFA) to ensure that the only person who has access to your account is you. Use it for FlashLine, email, banking, social media, and any other service that requires logging in. If MFA is an option, enable it by using a trusted mobile device, such as your smartphone, or an authenticator app.
  • Shake up your password protocol. According to NIST guidance, you should consider using the longest password or passphrase permissible. Get creative and customize your standard password for different sites, which can prevent cyber criminals from gaining access to these accounts and protect you in the event of a breach. Use password managers to generate and remember different, complex passwords for each of your accounts.
  • Install and update anti-virus software. Make sure all of your computers, Internet of Things devices, phones, and tablets are equipped with regularly updated antivirus software, firewalls, email filters, and anti-spyware.