Email Security
How do we avoid phishing and ransomware?
Table of Contents
Phishing
Phishing emails use social engineering, spoofing, and other techniques to trick the user into doing something for the attacker. Phishing attacks can be used to accomplish a variety of goals including stealing user credentials, data, or money.
Tips to avoid phishing attacks
Always check the sender
If the sender is familiar check their name and email address to make sure they are correct
Generic or non-personalized greeting
If someone knows you, they will address you by your name
Hover over link before clicking
It reveals the original URL of that link
Be cautious of emails that contain spelling or grammar errors
Check the email for misspellings and improper grammar.
Urgency and prompt to act fast, rewards and gifts
Beware of emails that create a sense of urgency and pressure you to act quickly or are offering rewards and gifts.
Check attachment’s file extension
Do not download and open extension like .exe, .jar, .htm etc. Always favour sharing a link to a secure OneDrive over attachments.
Ransomware
Ransom malware, or ransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment to regain access. Ransomware detections in Q1 2022 doubled the total volume reported for 2021, according to new cybersecurity research.
Overall regional detections of basic and evasive malware show organizations in Europe, the Middle East and Africa (EMEA) were hit harder than those in North, Central, and South America (AMER) at 57% and 22%, respectively, followed by the Asia-Pacific (APAC) region at 21%.
Protection against ransomware
-
Never click on unsafe links
-
Avoid disclosing personal information
-
Do not open suspicious email attachments
-
Keep your programs and operating system up to date
-
Never use unknown USB sticks
-
Use only known download sources
Going Further
Please check our other Security related articles: Password Best Practices, Cyber Security Best Practices & Other Cyber Security Threats.
A Digital University Session related to Security is also available as a recording: Security Best Practices.