What is Phishing?
Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details (and sometimes, indirectly, money) by masquerading as a trustworthy entity in an electronic communication. Communications purporting to be from popular social web sites, auction sites, banks, online payment processors or IT administrators are commonly used to lure unsuspecting public. Phishing emails may contain links to websites that are infected with malware. Phishing is typically carried out by email spoofing or instant messaging, and it often directs users to enter details at a fake website whose look and feel are almost identical to the legitimate one. Phishing is an example of social engineering techniques used to deceive users, and exploits the poor usability of current web security technologies. Attempts to deal with the growing number of reported phishing incidents include legislation, user training, public awareness, and technical security measures. Many websites have now created secondary tools for applications, like maps for games, but they should be clearly marked as to who wrote them, and you should not use the same passwords anywhere on the internet.
Tips to Identify Phishing Emails
- Most phishing campaigns want your username and password to be entered into some external website.
- Most phishing emails almost express urgency and threaten penalties. For example, "Click this link and provide your id and password. Failure to do so within 24 hours will cause your account to be suspended!" ITS will NOT send these types of messages.
- Most phishing emails are very generic. They lack individual signage, phone numbers, institutional graphics, and distinct contact information.
- Most phishing messages pretend to be from someone you know internally but in actuality come from outside of our network. For users with @fairfield.edu emails, if the [External] tag exists on the subject line, the message is from someone outside our organization.
- Most links within a phishing email will really point towards odd external websites. Hover over any email links before clicking. Make sure the website URL makes sense for the request.
- Most phishing emails contain incorrect spelling and odd grammar. Occasionally this is intentional to avoid phishing filters.
- Some phishing emails are completely unique, don’t follow any of these rules and appear completely legitimate. It’s important to maintain a healthy skepticism when it comes to your email. If you are ever in doubt forward the message in question to email@example.com. We can examine the message on your behalf.
Phishing and Security Training Videos
Ninjio Phishing Training Video https://www.dropbox.com/s/o1nm20o96j46bho/Netflix-Phishing.mp4?dl=0
Ninjio Spear Phishing Training Video https://www.dropbox.com/s/vbspctrzunfqrch/Spear-Phishing-Breach.mp4?dl=0
Ninjio Ransomware Training Video https://www.dropbox.com/s/rx0t6npqdk06npt/USB-Ransomware.mp4?dl=0
Ninjio Shameware Training Video https://www.dropbox.com/s/gwrbu4rkpxxwivm/Shameware-Ransom.mp4?dl=0
Ninjio Malware Training Video https://www.dropbox.com/s/fmrad7r5jvp75gr/HealthCare-Phishing.mp4?dl=0
Why was the phishing email not blocked?
Fairfield University has a variety of safeguards in place combating known viruses and phishing attempts. Millions of threating emails are stopped before any University employee or student sees them, by design. On occasion, an email will slip through the safeguards. If you receive what you suspect to be a dangerous email, delete it. Cyber security starts with users being informed and continually looking out for anything that seems suspicious.
I think an email I received might be phishing
Forward the email to firstname.lastname@example.org. Please include the header information if possible as this will help us identify where the email was coming from and stop others from receiving it. To obtain the Internet Header, see instructions below:
For OWA: Double-click the message to open it, and then click the icon (an envelope with a small document over it).
For Outlook on Windows: Double-click the message to open it in a new window. Select the tab, and then click .
For Outlook on Mac: In your Inbox (or other folder), right-click or
control-click the message, and then select .
After you forward the email to email@example.com, please delete the email and delete it from your deleted items folder as well.
Please do remember that ITS employees will NEVER ask you to provide your NetID password. Users should never willingly share their passwords with anyone, either via e-mail or website other than the official Fairfield University website. Should you receive any requests via e-mail asking for your NetID credentials, do not respond to the e-mail, do not open any associated attachments or visit websites referenced within it.