{"id":948,"date":"2020-04-07T11:24:25","date_gmt":"2020-04-07T15:24:25","guid":{"rendered":"https:\/\/www.trincoll.edu\/lits\/?page_id=948"},"modified":"2023-01-25T12:41:00","modified_gmt":"2023-01-25T17:41:00","slug":"reportspam","status":"publish","type":"page","link":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/","title":{"rendered":"Phishing Emails"},"content":{"rendered":"<div>\n<h2>Cybercriminals Like to Phish but Don&#8217;t Take the Bait<\/h2>\n<p>Phishing \u2013 when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links \u2013 remains one of the most popular tactics among cybercriminals today. Phishing is an attack carried out to steal usernames, passwords, credit card information, Social Security numbers, and\/or other sensitive data. Phishing is most often seen in the form of malicious emails pretending to be from credible sources like people, departments, or organizations related to the college. However, while phishing has gotten more sophisticated, keeping an eye out for typos, poor graphics, and other suspicious characteristics can be a telltale sign that the content is potentially coming from a phish.<\/p>\n<h2>\u00a0What is phishing?<\/h2>\n<p>Phishing is a type of electronic scam. Cybercriminals use deceptive tactics to manipulate people into doing what they want, intending to steal information and money. They use phishing because, unfortunately, it\u2019s easy to do and often effective.<\/p>\n<p>The tactics used, sometimes called \u201csocial engineering,\u201d is the foundation of all phishing scams conducted through emails, text messages, and cell phone calls. As technology becomes more advanced, so do cybercriminals&#8217; tactics.<\/p>\n<h2 id=\"mntl-sc-block_1-0-25\" class=\"comp mntl-sc-block tech-sc-block-heading mntl-sc-block-heading\"><span class=\"mntl-sc-block-heading__text\">How to Protect Yourself From Phishing Scams<\/span><\/h2>\n<p id=\"mntl-sc-block_1-0-26\" class=\"comp mntl-sc-block mntl-sc-block-html\">Reputable businesses, banks, websites, and other entities won&#8217;t ask you to submit personal information online. If you receive such a request and aren&#8217;t sure if it is legitimate, contact the sender by phone to see if the company sent the email.<\/p>\n<div id=\"mntl-sc-block_1-0-27\" class=\"comp mntl-sc-block mntl-sc-block-adslot mntl-block\">\n<div id=\"mntl-block_6-0\" class=\"comp mntl-block\">\n<div id=\"mntl-native_2-0\" class=\"comp mntl-native\">Some phishing attempts are amateurish and filled with broken grammar and misspellings, so they are easy to spot. However, some contain identical copies of familiar websites, such as your bank&#8217;s, to lull you into complying with the request for information.<\/div>\n<\/div>\n<\/div>\n<p id=\"mntl-sc-block_1-0-30\" class=\"comp mntl-sc-block mntl-sc-block-html\">Common sense safety steps include:<\/p>\n<ul id=\"mntl-sc-block_1-0-32\" class=\"comp mntl-sc-block mntl-sc-block-html\">\n<li>Don&#8217;t reply to an email that asks for personal information.<\/li>\n<li>Don&#8217;t open or download files attached to suspicious emails.<\/li>\n<li>Don&#8217;t click any links that appear in the email.<\/li>\n<li>Search the web for the email subject line. If it is a hoax, other people may have reported it.<\/li>\n<\/ul>\n<p id=\"mntl-sc-block_1-0-34\" class=\"comp mntl-sc-block mntl-sc-block-html\">Be particularly suspicious of emails with subject lines and content that include:<\/p>\n<ul id=\"mntl-sc-block_1-0-36\" class=\"comp mntl-sc-block mntl-sc-block-html\">\n<li>A request to verify your account immediately or the sender will close it<\/li>\n<li>An offer of a large sum of money in exchange for your account information<\/li>\n<li>An announcement that you&#8217;re the big winner in\u00a0a lottery you don&#8217;t remember entering<\/li>\n<li>A request for emergency financial help from a friend who is supposedly on vacation<\/li>\n<li>A threat of bad luck if you don&#8217;t reply<\/li>\n<li>A notification that your credit card has been hacked<\/li>\n<li>A request to forward the email to receive $500<\/li>\n<\/ul>\n<h2>I\u2019m still not sure if it\u2019s a legitimate message or a phish. What should I do?<\/h2>\n<p>You don&#8217;t have to be an expert. If something seems suspicious, it probably is. For college-related messages, forward emails using the report phishing email client add-in or by contacting the <a href=\"https:\/\/www.trincoll.edu\/lits\/help-support\/security\/reporting-an-information-security-incident\/\">Information Security office<\/a>, and we\u2019ll look into it for you.<\/p>\n<p>For suspicious messages sent to your personal account, do your research to see if the message is legitimate:<\/p>\n<ul>\n<li>Contact known persons or companies directly.<\/li>\n<li>If the sender is unknown, see if the organization actually exists and call them directly.<\/li>\n<li>Consider ignoring and deleting the message.<\/li>\n<\/ul>\n<\/div>\n<div class=\"ui-toggle-content opened\">\n<h3 class=\"\">What should I do if I opened a suspicious link or attachment or inadvertently share sensitive information?<\/h3>\n<p>Immediately report it as a possible incident. Visit the <a href=\"https:\/\/www.trincoll.edu\/lits\/help-support\/security\/reporting-an-information-security-incident\/\">Report an Incident\u00a0web page<\/a> to learn more.<\/p>\n<\/div>\n<h4>Learn More:<\/h4>\n<h4><a href=\"https:\/\/support.microsoft.com\/en-us\/windows\/protect-yourself-from-phishing-0c7ea947-ba98-3bd9-7184-430e1f860a44\">Protect yourself from phishing; learn to spot a phishing message with Microsoft<\/a><\/h4>\n<h4><a href=\"https:\/\/www.fbi.gov\/scams-and-safety\/common-scams-and-crimes\/spoofing-and-phishing\">Top News on Email Scams, Spoofing, and Phishing<\/a><\/h4>\n","protected":false},"excerpt":{"rendered":"<p>Cybercriminals Like to Phish but Don&#8217;t Take the Bait Phishing \u2013 when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links \u2013 remains one of the most popular tactics among cybercriminals today. Phishing is an attack carried out to steal usernames, passwords, credit card information, [&hellip;]<\/p>\n","protected":false},"author":161,"featured_media":0,"parent":210,"menu_order":9,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-948","page","type-page","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v25.8) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing Emails - Library &amp; Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Emails\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals Like to Phish but Don&#8217;t Take the Bait Phishing \u2013 when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links \u2013 remains one of the most popular tactics among cybercriminals today. Phishing is an attack carried out to steal usernames, passwords, credit card information, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/\" \/>\n<meta property=\"og:site_name\" content=\"Library &amp; Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-25T17:41:00+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/\",\"name\":\"Phishing Emails - Library &amp; Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\"},\"datePublished\":\"2020-04-07T15:24:25+00:00\",\"dateModified\":\"2023-01-25T17:41:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Technology\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Tech Support\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Email\",\"item\":\"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Phishing Emails\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trincoll.edu\/lits\/#website\",\"url\":\"https:\/\/www.trincoll.edu\/lits\/\",\"name\":\"Library &amp; Information Technology Services\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Phishing Emails - Library &amp; Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Emails","og_description":"Cybercriminals Like to Phish but Don&#8217;t Take the Bait Phishing \u2013 when a cybercriminal poses as a legitimate party in hopes of getting individuals to engage with malicious content or links \u2013 remains one of the most popular tactics among cybercriminals today. Phishing is an attack carried out to steal usernames, passwords, credit card information, [&hellip;]","og_url":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/","og_site_name":"Library &amp; Information Technology Services","article_modified_time":"2023-01-25T17:41:00+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/","url":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/","name":"Phishing Emails - Library &amp; Information Technology Services","isPartOf":{"@id":"https:\/\/www.trincoll.edu\/lits\/#website"},"datePublished":"2020-04-07T15:24:25+00:00","dateModified":"2023-01-25T17:41:00+00:00","breadcrumb":{"@id":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/reportspam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trincoll.edu\/lits\/"},{"@type":"ListItem","position":2,"name":"Technology","item":"https:\/\/www.trincoll.edu\/lits\/technology\/"},{"@type":"ListItem","position":3,"name":"Tech Support","item":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/"},{"@type":"ListItem","position":4,"name":"Email","item":"https:\/\/www.trincoll.edu\/lits\/technology\/tech-support\/email\/"},{"@type":"ListItem","position":5,"name":"Phishing Emails"}]},{"@type":"WebSite","@id":"https:\/\/www.trincoll.edu\/lits\/#website","url":"https:\/\/www.trincoll.edu\/lits\/","name":"Library &amp; Information Technology Services","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trincoll.edu\/lits\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/948","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/users\/161"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/comments?post=948"}],"version-history":[{"count":0,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/948\/revisions"}],"up":[{"embeddable":true,"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/pages\/210"}],"wp:attachment":[{"href":"https:\/\/www.trincoll.edu\/lits\/wp-json\/wp\/v2\/media?parent=948"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}