Don’t avoid downloading important updates, hackers exploit vulnerabilities found in older software, so it’s important to keep the apps on your devices current.
If you are ever in doubt, double check the request with the sender either by phone or by composing a new email—never reply to the email itself.
Trusted parties will never ask you for personal information through email.Try to make it a company policy not to collect employee information internally via attachments.
If an email from a well-known company is formatted badly, has obvious misspellings or is unrelated to the product or company, this is a red flag.
Phishers will try to spoof well-known companies, always be suspicious of unsolicited email, for ex. if you didn't prompt a password reset--don't click the link.
Big bonuses, large payments or gifts (ex.win a free iPad) for services are ways attackers try to get inside your head. If the promise is “too good to be true”, do some research before taking action.
Commonly, these attacks look like urgent emails coming from a boss or colleague, and attachments tend to look like a voicemail, fax or shipment tracking slip.
If you accidentally click on a link or think that you have been phished, talk to your IT vendor, put a stop on a wire transfer or alert other people in the organization immediately.
If your social networking profile is public, avoid sharing birthdays, kids’names, or detailed business information because attackers will use it to get clues about what your passwords might be.
Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form