{"id":316,"date":"2023-10-17T04:56:00","date_gmt":"2023-10-17T04:56:00","guid":{"rendered":"https:\/\/blogs.messiah.edu\/csblog\/?p=316"},"modified":"2023-10-17T15:25:14","modified_gmt":"2023-10-17T15:25:14","slug":"week-3-recognize-and-report-phishing","status":"publish","type":"post","link":"https:\/\/blogs.messiah.edu\/csblog\/week-3-recognize-and-report-phishing\/","title":{"rendered":"Phishing and How To Not Take the Bait"},"content":{"rendered":"\n<p><em>Welcome back for Week 3 of Cybersecurity Awareness Month 2023. This week, we&#8217;re talking about how to resist phishing attacks. Special thanks again to <a href=\"https:\/\/www.cisa.gov\/\">CISA <\/a>and to <a href=\"https:\/\/www.knowbe4.com\/\">KnowB4 <\/a>for the resources for this series. Catch up on <a href=\"https:\/\/blogs.messiah.edu\/csblog\/week-1-use-strong-passwords-and-a-password-manager\/\">Week 1 <\/a>and <a href=\"https:\/\/blogs.messiah.edu\/csblog\/week-2-enable-mfa\/\">Week 2<\/a> if you missed them! <\/em><\/p>\n\n\n\n<p><strong>So, What&#8217;s Phishing?<\/strong><\/p>\n\n\n\n<p>Phishing occurs when criminals try to get us to open harmful links, emails or attachments that could request our personal information or infect our devices. Phishing \u201cbait\u201d usually comes in the form of an email, text, direct message on social media or phone call. These messages are often designed to look like they come from a trusted person or organization, to get us to respond.<br><br><strong>Stay Safe with Three Simple Tips<\/strong><\/p>\n\n\n\n<p><strong>1. Recognize<\/strong><br>Look for these common signs:<br>\u2022 Urgent or emotionally appealing language, especially messages that claim dire consequences for not responding immediately<br>\u2022 Requests to send personal and financial information<br>\u2022 Untrusted shortened URLs<br>\u2022 Incorrect email addresses or links, like amazan.com<br>\ud83d\udc49A common sign used to be poor grammar or misspellings, but in the era of artificial intelligence (AI) some emails will now have perfect grammar and spellings. Be sure to look out for the other signs.<\/p>\n\n\n\n<p><strong>2. Resist<\/strong><br>If you suspect phishing:<br>\u2022 Resist the temptation to click on links or attachments that seem too good to be true and may be trying to access your personal information. <br>\u2022 Report the phish to protect yourself and others. <br>\ud83d\udc49Typically, you\u2019ll find options to report near the person\u2019s email address or username. You can also report via the \u201creport spam\u201d button in the toolbar or settings.<\/p>\n\n\n\n<p><strong>3. Delete<\/strong> <br>Delete the message. Don\u2019t reply or click on any attachment or link, including any \u201cunsubscribe\u201d link.   <br>\ud83d\udc49 Just delete.  <br><br>If a message looks suspicious, it&#8217;s probably phishing. However, if you think it could be real, don&#8217;t click on any link or call any number in the message. Look up another way to contact the company or person directly:<br>\u2022 Search for the company&#8217;s website in your web browser and capture their contact information from the verified website. <br>\u2022 Use another way to reach the person to confirm whether they contacted you. For example, if you get a strange message from your friend on Facebook, and you have their phone number, text or call them to ask if they sent the message.<\/p>\n\n\n\n<p>\ud83e\uddd0 <strong>Want to see phishing in action? &gt;&gt;&gt;<\/strong> <br>1. <a href=\"https:\/\/training.knowbe4.com\/modstore\/view\/c033863b-b521-11e9-84bf-123d7cbdf51c\">Watch a hacker<\/a> use social engineering to gain access to someone&#8217;s computer. <br>2. Take <a href=\"https:\/\/phishingquiz.withgoogle.com\/\">this interesting quiz<\/a> and see if you can spot when you&#8217;re being phished (its tough!).<\/p>\n\n\n\n<p>Most of all, remember \ud83d\udc47<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"791\" height=\"1024\" src=\"https:\/\/blogs.messiah.edu\/csblog\/wp-content\/uploads\/2023\/10\/Be-An-Email-Superhero-791x1024.jpg\" alt=\"\" class=\"wp-image-319\" srcset=\"https:\/\/blogs.messiah.edu\/csblog\/wp-content\/uploads\/sites\/26\/2023\/10\/Be-An-Email-Superhero-791x1024.jpg 791w, https:\/\/blogs.messiah.edu\/csblog\/wp-content\/uploads\/sites\/26\/2023\/10\/Be-An-Email-Superhero-232x300.jpg 232w, https:\/\/blogs.messiah.edu\/csblog\/wp-content\/uploads\/sites\/26\/2023\/10\/Be-An-Email-Superhero-768x994.jpg 768w, https:\/\/blogs.messiah.edu\/csblog\/wp-content\/uploads\/sites\/26\/2023\/10\/Be-An-Email-Superhero-1187x1536.jpg 1187w, https:\/\/blogs.messiah.edu\/csblog\/wp-content\/uploads\/sites\/26\/2023\/10\/Be-An-Email-Superhero-1583x2048.jpg 1583w, https:\/\/blogs.messiah.edu\/csblog\/wp-content\/uploads\/sites\/26\/2023\/10\/Be-An-Email-Superhero-scaled.jpg 1978w\" sizes=\"auto, (max-width: 767px) 89vw, (max-width: 1000px) 54vw, (max-width: 1071px) 543px, 580px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Welcome back for Week 3 of Cybersecurity Awareness Month 2023. This week, we&#8217;re talking about how to resist phishing attacks. Special thanks again to CISA and to KnowB4 for the resources for this series. Catch up on Week 1 and Week 2 if you missed them! So, What&#8217;s Phishing? Phishing occurs when criminals try to &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.messiah.edu\/csblog\/week-3-recognize-and-report-phishing\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Phishing and How To Not Take the Bait&#8221;<\/span><\/a><\/p>\n","protected":false},"author":103,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-316","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/posts\/316","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/users\/103"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/comments?post=316"}],"version-history":[{"count":14,"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/posts\/316\/revisions"}],"predecessor-version":[{"id":379,"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/posts\/316\/revisions\/379"}],"wp:attachment":[{"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/media?parent=316"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/categories?post=316"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.messiah.edu\/csblog\/wp-json\/wp\/v2\/tags?post=316"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}