Email is a great tool for communicating with others. Unfortunately, it is also an ideal tool for social engineering and phishing attempts. Phishing schemes are get more sophisticated and harder to detect. Here are some quick tips to keep in mind.
- Do NOT click on links in emails. Type the address directly into the web browser.
- Learn to spot non-legitimate web sites:
Look at the address between the // and the first / – it should end with the company you expect
- When TCU upgrades its computer or email systems, we will NEVER send a link inside an email which will go to a website requesting that you login or enter your username and password.
- TCU Information Technology, including the IT Support Help Desk and IT Security, will NEVER ask you for your password, via email, the phone or in person. No reputable company will ask you for your password.
- If an email looks fishy, it probably is. Just delete it.
Click the links below for more information:
How to Protect Yourself on Email – a handout with techniques to deal with phishing, spam, spoofing, attachments and data protection
Email Security 2010 – a PowerPoint presentation focusing on email best practices
Email Spoofing – counterfeit emails using stolen addresses – it can happen to you!