Skip to content
  • There are no suggestions because the search field is empty.

Email Security

How do we avoid phishing and ransomware?

Table of Contents

Phishing

Ransomware


 

Phishing 

Phishing emails use social engineering, spoofing, and other techniques to trick the user into doing something for the attacker. Phishing attacks can be used to accomplish a variety of goals including stealing user credentials, data, or money. 

Tips to avoid phishing attacks 


Always check the sender 

If the sender is familiar check their name and email address to make sure they are correct 

Generic or non-personalized greeting 

If someone knows you, they will address you by your name  

Hover over link before clicking 

It reveals the original URL of that link 

Be cautious of emails that contain spelling or grammar errors

Check the email for misspellings and improper grammar. 

Urgency and prompt to act fast, rewards and gifts 

Beware of emails that create a sense of urgency and pressure you to act quickly or are offering rewards and gifts.

Check attachment’s file extension  

Do not download and open extension like .exe, .jar, .htm etc. Always favour sharing a link to a secure OneDrive over attachments. 

 

Back to Top


 

Ransomware 

Ransom malware, or ransomware, is a type of malware that prevents users from accessing their system or personal files and demands ransom payment to regain access. Ransomware detections in Q1 2022 doubled the total volume reported for 2021, according to new cybersecurity research. 

Overall regional detections of basic and evasive malware show organizations in Europe, the Middle East and Africa (EMEA) were hit harder than those in North, Central, and South America (AMER) at 57% and 22%, respectively, followed by the Asia-Pacific (APAC) region at 21%. 

Protection against ransomware 

  • Never click on unsafe links 

  • Avoid disclosing personal information 

  • Do not open suspicious email attachments 

  • Keep your programs and operating system up to date 

  • Never use unknown USB sticks 

  • Use only known download sources

 

Back to Top


furtherGoing Further

Please check our other Security related articles: Password Best Practices, Cyber Security Best Practices & Other Cyber Security Threats.

A Digital University Session related to Security is also available as a recording: Security Best Practices.