{"id":3037,"date":"2020-04-17T16:23:55","date_gmt":"2020-04-17T08:23:55","guid":{"rendered":"http:\/\/sites.gtiit.edu.cn\/it\/?page_id=3037"},"modified":"2021-07-06T11:24:32","modified_gmt":"2021-07-06T03:24:32","slug":"what-is-phishing-and-how-to-spot-it","status":"publish","type":"page","link":"https:\/\/sites.gtiit.edu.cn\/it\/home\/cybersecurity-and-it-policies\/what-is-phishing-and-how-to-spot-it\/","title":{"rendered":"What is Phishing and How to spot it?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"3037\" class=\"elementor elementor-3037\" data-elementor-settings=\"[]\">\n\t\t\t\t\t\t<div class=\"elementor-inner\">\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-1e8befa elementor-section-content-middle elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"1e8befa\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-62e4419\" data-id=\"62e4419\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-5c26cc7 elementor-widget elementor-widget-heading\" data-id=\"5c26cc7\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">What is Phishing and how to spot it?<\/h1>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f26838e elementor-widget elementor-widget-text-editor\" data-id=\"f26838e\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t<blockquote><p style=\"text-align: left;\"><em>The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. &#8212; Wikipedia<\/em><\/p><\/blockquote><p style=\"padding-left: 30px;\">Phishing is the name given to scams sent via email that try to trick you into revealing sensitive information or downloading malicious software such as viruses, malware or ransomware. These phishing messages pretend to be from recognisable organisations or people you know in order to gain your trust so that you will follow the action they are requesting. These organisation can include banks, online retailers, delivery companies, technology companies and other trusted organisations including the University.<\/p><h3>Social Engineering<\/h3><p style=\"padding-left: 30px;\">The perpetrators of phishing use often very simple social engineering techniques in order to trick you into revealing information.<\/p><ul><li>Phishing emails often scare you into taking urgent action, for example asking you to enter your details on a website to avoid your account being suspended.<\/li><li>The opportunity to get something for free is another common practise of phishing. Entering a competition or claiming a price is another way you can be enticed to enter your details online.<\/li><li>They can also present innocent-looking links to also lure you in, such as for shipping tracking or updating your contact details.<\/li><li>As well as impersonating companies, perpetrators of phishing can also impersonate people you know. Doing this they can ask you to purchase items such as online vouchers on their behalf and request that you send them the codes.<\/li><\/ul><h2>How to spot a phishing message?<\/h2><p style=\"padding-left: 30px;\">Think before you click. Phishing is the most common kind of attack. Look out for <span style=\"color: #ff0000;\">Language<\/span>, <span style=\"color: #ff0000;\">Design<\/span>, <span style=\"color: #ff0000;\">Name<\/span>, <span style=\"color: #ff0000;\">Action<\/span><\/p><h3>Language<\/h3><ol><li>Many phishing emails have poor grammar, punctuation and spelling.<\/li><li>Is it addressed to you by name, or does it refer to \u2018valued customer\u2019, or \u2018friend\u2019, or \u2018colleague\u2019? This can be a sign that the sender does not actually know you, and that it is part of a phishing scam.<\/li><li>Does the email contain a veiled threat that asks you to act urgently? Be suspicious of words like \u2018send these details within 24 hours\u2019 or \u2018you have been a victim of crime, click here immediately\u2019.<\/li><li>If it sounds too good to be true, it probably is. It\u2019s most unlikely that someone will want to give you money, or give you access to a secret part of the Internet.<\/li><\/ol><h3>Design<\/h3><ol><li>Is the design and overall quality what would you\u2019d expect from the organisation the email is supposed to come from?<\/li><li>The entire text of the email may be contained within an image rather than the usual text format. The image contains an embedded link to a bogus site.<\/li><li>Is the email asking you to click on a link? Look at the link carefully to see if it looks credible. For example, if the hyperlink seems to be from your bank, make sure it would go to your bank\u2019s website, and not to something with a different name.<\/li><\/ol><h3>Name<\/h3><ol><li>Look at the sender\u2019s name. Does it sound legitimate, or is it trying to mimic someone you know?<\/li><li>Double check the sender\u2019s email address. Often phishing emails attempt to mimic an official email address by making it look as close to the original as they can. Make certain you check what proceeds the \u2018@\u2019 symbol.<\/li><\/ol><h3>Action<\/h3><ol><li>Think, what is the email asking you to do?<\/li><li>Your bank, or any other official source such as the University, should never ask you to supply your personal information or logon details.<\/li><li>If the email is from a person, is what they are asking you to do unusual or out of character.<\/li><li>Are you being asked to view an attachment or to install some software?<\/li><\/ol><p style=\"padding-left: 30px;\">For more information and watch a training video (produced by Microsoft), <a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4033787\/windows-protect-yourself-from-phishing\">please click here<\/a>.<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cc07769 elementor-widget elementor-widget-spacer\" data-id=\"cc07769\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-765b050 elementor-widget elementor-widget-heading\" data-id=\"765b050\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h6 class=\"elementor-heading-title elementor-size-medium\">Chance to Win a Prize<\/h6>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5e2a936 elementor-widget elementor-widget-text-editor\" data-id=\"5e2a936\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\">\n\t\t\t\t \t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4bab93d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4bab93d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t\t\t<div class=\"elementor-row\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a419433\" data-id=\"a419433\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-column-wrap\">\n\t\t\t\t\t\t\t<div class=\"elementor-widget-wrap\">\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>What is Phishing and how to spot it? The fraudulent attempt to obtain sensitive information or data, such as usernames, passwords and credit card details, by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing, instant messaging, and text messaging, phishing often directs users to enter personal information [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"parent":549,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/3037"}],"collection":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/comments?post=3037"}],"version-history":[{"count":3,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/3037\/revisions"}],"predecessor-version":[{"id":3916,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/3037\/revisions\/3916"}],"up":[{"embeddable":true,"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/pages\/549"}],"wp:attachment":[{"href":"https:\/\/sites.gtiit.edu.cn\/it\/wp-json\/wp\/v2\/media?parent=3037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}