We are noticing an increase in phishing activity today. Please review the refresher below as a reminder of what suspicious emails may look like.
In addition to the suggestions below, if you know who the email is “supposed” to be from and the email address on the email does not match, or looks strange…
Treat it as suspicious and report it to the NEOMED Help Desk at email@example.com.
How to Spot a Phish*
What is Phishing?
A technique used to fraudulently obtain usernames, passwords, credit card numbers and other sensitive information.
Fraudulent emails typically ask you to:
- Open an attachment.
- Click on a link, redirecting you to a malicious website.
- You may be prompted to enter personal information.
Types of Phishing Attacks
- Spear Phishing: A highly targeted form of phishing that hones in on a specific group of individuals or organization.
- Whaling: A form of phishing, targeted at executive level individuals.
- Cloning: Whereby a legitimate email is duplicated but, the content is replaced with malicious links or attachments.
Anatomy of a Phishing Email
- Contains links or attachments
- Poor grammar and spelling
- Requests personal or sensitive information
- High sense of urgency and/or privacy
- Discusses confidential subjects like salaries
- Incentives through threat of reward
*Courtesy of Partners HealthCare
-Submitted by Denise Cardon