You've Been Phished
How to Detect a Phishing Attack
- Messages creating a tremendous sense of urgency.
- Look for typos or discrepancies in logos.
- Pressure to bypass or ignore our security policies or procedures.
- Read URLs from left to right, the last address is the true domain, for example https://store.amazon- com.example.com/index.html might look like it will take you to Amazon’s website, but in fact it will take you to example.com.
- Offers that seem too good to be true.
- Generic greetings such as "Dear customer" or "Dear Member"
- Emails that are work related but are sent from a personal email address, such as hotmail.com or gmail.com.
- Websites that claim to be secure but do not use HTTPS.
- Requests for sensitive data such as credit card numbers or account passwords.
- The tone or wording of the message does not sound like the sender.
- Sites that begin with an IP addresses instead of a domain name.
Security Recommendations
ITS Information Security strongly recommends the following for you:
- Visit the ITS Information Security Phishing page to learn more about how to recognize these phishing emails and protect yourself and our organization from getting hooked.
- If you have not taken the ITS Information Security and Awareness Training, now is a great opportunity to reinforce your security awareness. Click here to star.
Think before you click! If you suspect a phishing attack, report it immediately to servicedesk@lmu.edu.