650.580.1415 :: producer of design :: San Francisco
producer of design
wilfredo-logo-stories.jpg

Blog

a collection of my musings and ramblings across all things creative and all things technology as I love both!

Technology Alert :: Phishing, F.A.Q.

A Global Phenomenon 

A Global Phenomenon 

What is “Phishing”?

Source :: ftc.gov

Source :: ftc.gov

The Federal Trade Commission describes “Phishing” as: 

When internet fraudsters impersonate a business to trick you into giving out your personal information, it’s called phishing. Don't reply to email, text, or pop-up messages that ask for your personal or financial information. Don’t click on links within them either – even if the message seems to be from an organization you trust. It isn’t. Legitimate businesses don’t ask you to send sensitive information through insecure channels.

Who is vulnerable to “Phishing”?

Anyone with an email address and internet access. (Business and Personal email address)

Is “Phishing” a virus?

No. Phishing is NOT a virus. 

What do you do if you suspect an “Phishing” email attempt?

  • First and foremost DO NOT click any embedded links asking for ANY personal information.
  • Secondly, Be cautious about opening attachments & downloading files from emails, regardless of who sent them. Good practice is to call the sender and verify the email is truly legitimate. 
  • Forward any suspected Phishing emails to spam@uce.gov and reportphishing@antiphishing.org 

What additional email security enhancements can I implement to protect my email identity?

  • Never share your email password with anyone.
  • Be judicious when using your email credentials online.
  • Use strong passwords.
  • Use a password manager such as 1Password.
  • Exercise an overabundance of caution with email correspondence.
  • Set up a Two Step Authentication (if you don’t know how - I’d love to help you set this up)

 

If you want to learn more about “Phishing” and the “Two Step Authentication” I have left a few links below for your research ::

 

FTC  

 

https://www.consumer.ftc.gov/articles/0003-phishing

https://www.consumer.ftc.gov/articles/0376-hacked-email

 

CNET 

 

http://www.cnet.com/news/two-factor-authentication-what-you-need-to-know-faq/

 

Symantec Intelligence Report (Jan 2015)

 

https://www.symantec.com/content/en/us/enterprise/other_resources/b-intelligence-report-01-2015-en-us.pdf