Phishing

Stop. Click. Think.

Phishing attacks share many characteristics. Here are the typical steps involved in launching phishing attacks via email or telephone.

Anatomy of an Email Phishing Attack

  • An email arrives in your inbox.
  • The email pretends to be from a legitimate organization, business or government agency.
  • The email will have a persuasive message designed to entice the recipient to respond.
  • The email will convey a sense of urgency.
  • The email will have a reassurance of security.
  • The email will have a link to a website, pop-up or web-based form.
  • Clicking on the link will lead to a bogus website where the Phishers are waiting to steal your information. You may be prompted to provide private information such as login credentials and/or account information, PIN, credit card information, etc. If you share this information, you are now officially a victim.

Defend Yourself

Immediately delete all suspicious emails. Remember: No legitimate business or government agency will ever ask for personal information via email or phone unless you initiate the contact. If you receive such a request, DELETE THE EMAIL.

Never click on a link in an email! Instead, copy and paste the link in your web browser address bar.

Anatomy of a Phone Phishing Attack

  • You receive a phone call from what sounds to be a legitimate organization, business or government agency.
  • The caller will have a persuasive message designed to entice you to respond.
  • The caller will convey a sense of urgency.
  • The caller will have a reassurance of security and caring about your well-being.
  • The caller will then either request personal information, ask for money or even direct you to a website where they are waiting to steal your information.

Defend Yourself

Do not share any personal information. Remember: No legitimate business or government agency will ever ask for personal information via email or phone unless you initiate the contact. If you receive such a request, HANG UP.