{"id":774,"date":"2023-03-07T18:18:28","date_gmt":"2023-03-07T18:18:28","guid":{"rendered":"http:\/\/test.sta.uwi.edu\/cits\/?page_id=774"},"modified":"2023-03-07T18:18:29","modified_gmt":"2023-03-07T18:18:29","slug":"phishing","status":"publish","type":"page","link":"https:\/\/sta.uwi.edu\/cits\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Phishing attacks<\/strong><\/h2>\n\n\n\n<figure class=\"wp-block-image alignright size-full right\"><img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"380\" src=\"https:\/\/sta.uwi.edu\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing.jpg\" alt=\"\" class=\"wp-image-775\" srcset=\"https:\/\/sta.uwi.edu\/cits\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing.jpg 380w, https:\/\/sta.uwi.edu\/cits\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing-300x300.jpg 300w, https:\/\/sta.uwi.edu\/cits\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing-150x150.jpg 150w\" sizes=\"(max-width: 380px) 100vw, 380px\" \/><\/figure>\n\n\n\n<p>Staff and Student University accounts are regularly targeted by phishing attacks. It&#8217;s important you understand more about phishing and learn ways to protect yourself.<\/p>\n\n\n\n<p>The impact of a successful phishing attack can be considerable and does not only include loss of access to your staff or student email but can be more intrusive and include personal financial loss and identity theft and reputational damage.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"https:\/\/sta.uwi.edu\/cits\/phishing#What%20is%20phishing?\">What&nbsp;is phishing?<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sta.uwi.edu\/cits\/phishing#Spotting%20phishing%20emails\">Spotting phishing emails<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sta.uwi.edu\/cits\/phishing#Actions%20to%20protect%20yourself\">Actions to protect yourself<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sta.uwi.edu\/cits\/phishing#If%20you%20think%20you%20have%20received%20a%20phishing%20email\">If you think you have received a phishing email<\/a><\/li>\n\n\n\n<li><a href=\"https:\/\/sta.uwi.edu\/cits\/phishing#If%20you%20have%20responded%20to%20a%20phishing%20email\">If you have responded to a phishing email<\/a><\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><strong><a>What is phishing?<\/a><\/strong><\/h2>\n\n\n\n<p>Phishing is a type of&nbsp;social engineering attack&nbsp;designed to trick you into handing over personal information namely email and password. This can then be used to compromise your email, social media and other online accounts that may use the same email \/ password combination.<\/p>\n\n\n\n<p>Most phishing attacks are sent by email, and cyber criminals will often impersonate someone or an organisation familiar to you, such as a fellow student, lecturer, IT or even campus administration. Phishing emails may look and sound like they are genuine, and they may even contain some of your personal information.<\/p>\n\n\n\n<p>A typical phishing email will tell you that you need to do something urgently, for example login to a website or complete a form or download an email attachment.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a><strong>Spotting phishing emails<\/strong><\/a><\/h2>\n\n\n\n<p>Phishing emails have become very sophisticated and increasingly difficult to identify. However, there are some tricks that are used to try and get you to respond without thinking.&nbsp;<\/p>\n\n\n\n<p>Here are some things to look out for when reading your emails:<\/p>\n\n\n\n<figure class=\"wp-block-table\"><table><tbody><tr><td><strong>Does the email&#8230;<\/strong><\/td><td>&nbsp;<\/td><\/tr><tr><td><strong>use a generic greeting?<\/strong><\/td><td>Phishing emails often use generic greetings like &#8220;Dear customer&#8221;, \u201cHello\u201d, or \u201cHi user\u201d, although, more sophisticated emails may use your real name.<\/td><\/tr><tr><td><strong>contain any University branding?<\/strong><\/td><td>Phishing emails are often mass emails sent to numerous institutions and therefore do not contain University specific branding such as University Crest or a proper email signature.<\/td><\/tr><tr><td><strong>convey a sense of urgency?<\/strong><\/td><td>Threats and urgent warnings like &#8220;your account is about to expire &#8211; act now&#8221; are intended to cause panic so you act quickly without thinking.<\/td><\/tr><tr><td><strong>contain an offer that&#8217;s&nbsp;too good to be true?<\/strong><\/td><td>Emails offering you free software or financial opportunities are often fake. For example, transferring or receiving money for someone else. If something sounds too good to be true, it probably is.<\/td><\/tr><tr><td><strong>contain bad grammar and spelling?<\/strong><\/td><td>It&#8217;s unlikely genuine emails from legitimate sources will contain grammatical mistakes.<\/td><\/tr><tr><td><strong>contain attachments you were not expecting?<\/strong><\/td><td>Don&#8217;t open attachments you are not expecting or from people you don&#8217;t know. They may contain harmful viruses.<\/td><\/tr><tr><td><strong>ask you for personal information?<\/strong><\/td><td>Campus IT Services, or any other legitimate organisation will not randomly ask you for personal information over email.<\/td><\/tr><tr><td><strong>contain a suspicious link?<\/strong><\/td><td>Pause before you click on any links in an email. If you are using a computer, hover your mouse over the link to check that the actual address you\u2019ll be taken to matches the address in the email. If it doesn&#8217;t look right, don&#8217;t click it.<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><a><strong>Actions to protect yourself<\/strong><\/a><\/h2>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do not&nbsp;share your passwords with anyone.<\/li>\n\n\n\n<li>Do not&nbsp;respond to emails that ask you to confirm personal information.<\/li>\n\n\n\n<li>Do not&nbsp;click on or open suspicious links or attachments especially if you do not know the sender of the email<\/li>\n\n\n\n<li>If you&#8217;re taken to a login page or website, never attempt to log in or enter your personal information \u2013 even if the website looks legitimate. Double check the website address to make sure it is one that you are accustomed visiting.<\/li>\n\n\n\n<li>If it appears to be from someone you know contact the original sender by phone or other message to verify the authenticity \u2013 that person might have been hacked and they are unaware.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\"><a><strong>If you think you have received a phishing email<\/strong><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>Ignore any instructions in the email<\/li>\n\n\n\n<li>Report the email by forwarding the message as an attachment. Students can send reports to&nbsp;<a href=\"mailto:stacitsfollowup@my.uwi.edu\">stacitsfollowup@my.uwi.edu<\/a>&nbsp;and Staff can send reports to&nbsp;<a href=\"mailto:servicedesk@sta.uwi.edu%E2%80%8B\">servicedesk@sta.uwi.edu<\/a><\/li>\n\n\n\n<li>Delete the email.<\/li>\n<\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><a><strong>If you have responded to a phishing email<\/strong><\/a><\/h2>\n\n\n\n<ol class=\"wp-block-list\">\n<li>If you have entered your University password through a phishing scam then Log into the Student Portal and change your password. This is of utmost importance.&nbsp;<\/li>\n\n\n\n<li>Make sure you have the latest Antivirus definition and scan your pc\/laptop for viruses and malware. The free version of Malwarebytes is also a good option to run.&nbsp;<\/li>\n\n\n\n<li>Not seeing any new emails? Check your Outlook &#8220;Rules&#8221; to ensure the hacker did not create any rules. Sometimes they create a rule to have all new mail redirected to your deleted items folder.&nbsp;<\/li>\n\n\n\n<li>Report the email by forwarding the message as an attachment. Students can send reports to&nbsp;<a href=\"mailto:stacitsfollowup@my.uwi.edu\">stacitsfollowup@my.uwi.edu<\/a>&nbsp;and Staff can send reports to&nbsp;<a href=\"mailto:servicedesk@sta.uwi.edu%C2%A0\">servicedesk@sta.uwi.edu<\/a>&nbsp;<\/li>\n\n\n\n<li>Ensure that you do not have any auto-forwarders setup to an external address. Microsoft recently prevented this for security reasons which is causing issues for students.<\/li>\n<\/ol>\n\n\n\n<p>Here are some examples of recent Phishing Attacks:<\/p>\n\n\n\n<p><strong>Phishing Example 1:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/sta.uwi.edu\/cits\/sites\/default\/files\/cits\/phishing-example-01_0.jpg\" alt=\"phishing-example-01_0.jpg\"\/><\/figure>\n\n\n\n<p><strong>Phishing Example 2:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/sta.uwi.edu\/cits\/sites\/default\/files\/cits\/phishing-example-02.jpg\" alt=\"phishing-example-02.jpg\"\/><\/figure>\n\n\n\n<p><strong>Phishing Example 3:<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/sta.uwi.edu\/cits\/sites\/default\/files\/cits\/phishing-example-03.jpg\" alt=\"phishing-example-03.jpg\"\/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Phishing attacks Staff and Student University accounts are regularly targeted by phishing attacks. It&#8217;s important you understand more about phishing and learn ways to protect yourself. The impact of a successful phishing attack can be considerable and does not only include loss of access to your staff or student email but can be more intrusive [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"_et_pb_use_builder":"off","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"dipi_cpt_category":[],"class_list":["post-774","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Phishing | Campus I.T. Services<\/title>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/sta.uwi.edu\/cits\/phishing\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Phishing | Campus I.T. Services\" \/>\r\n<meta property=\"og:description\" content=\"Phishing attacks Staff and Student University accounts are regularly targeted by phishing attacks. It&#8217;s important you understand more about phishing and learn ways to protect yourself. The impact of a successful phishing attack can be considerable and does not only include loss of access to your staff or student email but can be more intrusive [&hellip;]\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/sta.uwi.edu\/cits\/phishing\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Campus I.T. Services\" \/>\r\n<meta property=\"article:modified_time\" content=\"2023-03-07T18:18:29+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/sta.uwi.edu\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing.jpg\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/phishing\\\/\",\"url\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/phishing\\\/\",\"name\":\"Phishing | Campus I.T. Services\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/phishing\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/phishing\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sta.uwi.edu\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2023\\\/03\\\/phishing.jpg\",\"datePublished\":\"2023-03-07T18:18:28+00:00\",\"dateModified\":\"2023-03-07T18:18:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/phishing\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/phishing\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/phishing\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sta.uwi.edu\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2023\\\/03\\\/phishing.jpg\",\"contentUrl\":\"https:\\\/\\\/sta.uwi.edu\\\/wp-content\\\/uploads\\\/sites\\\/7\\\/2023\\\/03\\\/phishing.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/phishing\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Campus I.T. Services\",\"item\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/#website\",\"url\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/\",\"name\":\"Campus I.T. Services\",\"description\":\"\",\"alternateName\":\"CITS\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sta.uwi.edu\\\/cits\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing | Campus I.T. Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sta.uwi.edu\/cits\/phishing\/","og_locale":"en_US","og_type":"article","og_title":"Phishing | Campus I.T. Services","og_description":"Phishing attacks Staff and Student University accounts are regularly targeted by phishing attacks. It&#8217;s important you understand more about phishing and learn ways to protect yourself. The impact of a successful phishing attack can be considerable and does not only include loss of access to your staff or student email but can be more intrusive [&hellip;]","og_url":"https:\/\/sta.uwi.edu\/cits\/phishing\/","og_site_name":"Campus I.T. Services","article_modified_time":"2023-03-07T18:18:29+00:00","og_image":[{"url":"https:\/\/sta.uwi.edu\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing.jpg","type":"","width":"","height":""}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/sta.uwi.edu\/cits\/phishing\/","url":"https:\/\/sta.uwi.edu\/cits\/phishing\/","name":"Phishing | Campus I.T. Services","isPartOf":{"@id":"https:\/\/sta.uwi.edu\/cits\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sta.uwi.edu\/cits\/phishing\/#primaryimage"},"image":{"@id":"https:\/\/sta.uwi.edu\/cits\/phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/sta.uwi.edu\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing.jpg","datePublished":"2023-03-07T18:18:28+00:00","dateModified":"2023-03-07T18:18:29+00:00","breadcrumb":{"@id":"https:\/\/sta.uwi.edu\/cits\/phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sta.uwi.edu\/cits\/phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sta.uwi.edu\/cits\/phishing\/#primaryimage","url":"https:\/\/sta.uwi.edu\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing.jpg","contentUrl":"https:\/\/sta.uwi.edu\/wp-content\/uploads\/sites\/7\/2023\/03\/phishing.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/sta.uwi.edu\/cits\/phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Campus I.T. Services","item":"https:\/\/sta.uwi.edu\/cits\/"},{"@type":"ListItem","position":2,"name":"Phishing"}]},{"@type":"WebSite","@id":"https:\/\/sta.uwi.edu\/cits\/#website","url":"https:\/\/sta.uwi.edu\/cits\/","name":"Campus I.T. Services","description":"","alternateName":"CITS","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sta.uwi.edu\/cits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/pages\/774","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/comments?post=774"}],"version-history":[{"count":1,"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/pages\/774\/revisions"}],"predecessor-version":[{"id":776,"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/pages\/774\/revisions\/776"}],"wp:attachment":[{"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/media?parent=774"}],"wp:term":[{"taxonomy":"dipi_cpt_category","embeddable":true,"href":"https:\/\/sta.uwi.edu\/cits\/wp-json\/wp\/v2\/dipi_cpt_category?post=774"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}