{"id":5919,"date":"2017-10-03T17:09:58","date_gmt":"2017-10-03T21:09:58","guid":{"rendered":"http:\/\/blogs.cooperhealth.org\/weeklyrounds\/?p=5919"},"modified":"2017-10-03T17:10:15","modified_gmt":"2017-10-03T21:10:15","slug":"cybersecurity-month-email-phishing-and-how-to-protect-yourself","status":"publish","type":"post","link":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/","title":{"rendered":"Cybersecurity Month: Email Phishing and How to Protect Yourself"},"content":{"rendered":"<p>What do you do? You check your email and find a message from your bank threatening to close your account if you don\u2019t reply immediately with your contact information, or an email arrives from a business associate that includes a link to a web site that you don\u2019t recognize. You&#8217;ve gotten email from them before, but this one seems suspicious.<\/p>\n<p>These messages and others like them are examples of phishing, a method of online identity theft. In addition to stealing personal and financial data, phishers can infect computers with viruses and convince people to participate in criminal activity.<\/p>\n<p>The cyber attacker\u2019s goal is for you to click on a link. However, instead of harvesting your information, the goal is to infect your computer<strong>. <\/strong>If you click on the link, you are directed to a website that silently launches an attack against your browser, and, if successful, these cyber criminals have full control over your computer and possibly your entire network.<\/p>\n<p><strong>Scams<\/strong><\/p>\n<p>Classic examples of scams meant to defraud you include notices that you\u2019ve won the lottery (even though you never entered it) or that a dignitary needs to transfer millions of dollars into your country and would like to pay you to help with the transfer. They will then tell you that you have to pay a processing fee before you can get your money. After you pay these fees the criminals disappear, never to be heard from again.<\/p>\n<p><strong>How to Protect Yourself<\/strong><\/p>\n<p>For most phishing attacks to be successful you have to do something after reading the email (such as opening the attachment, clicking on the link, or responding to the request for information). If after reading an email you think it is a phishing attack or scam, simply delete the message. Here are some indications that an email is a phishing attack.<\/p>\n<ul>\n<li>Be suspicious of any email that requires immediate action or creates a sense of urgency.<\/li>\n<li>Be suspicious of emails addressed to \u201cDear Customer\u201d or some other generic salutation.<\/li>\n<li>Spelling and bad grammar. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes, it might be a scam.<\/li>\n<\/ul>\n<ul>\n<li>Beware of links in email. If you see a link in a suspicious email message, don&#8217;t click on it. Rest your mouse (but don&#8217;t click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company&#8217;s web address.<\/li>\n<\/ul>\n<ul>\n<li>Do not click on links. Instead, copy the URL from the email and paste it into your browser. Even better is to simply type the destination name into your browser. For example, if you get an email from UPS telling you your package is ready for delivery, do not click on the link. Instead, go to the UPS website and then copy and paste the tracking number.<\/li>\n<li>Be suspicious of attachments; only open attachments that you were expecting.<\/li>\n<li>An email from your friend does not mean they sent it. Your friend\u2019s computer may have been infected or their account may have been compromised, and malware is sending the email to all of your friend\u2019s contacts. If you get a suspicious email from a trusted friend or colleague, call them to confirm that they sent it.<\/li>\n<\/ul>\n<p><strong>What does a phishing email message look like?<\/strong><\/p>\n<p><strong><u>Example 1.<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-5920 aligncenter\" src=\"http:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1-300x91.jpg\" alt=\"\" width=\"300\" height=\"91\" srcset=\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1-300x91.jpg 300w, https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1.jpg 570w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Probably the easiest way to identify if an email is legitimate or not, is to simply hover your mouse arrow over the name in the \u201cFrom\u201d column. For example, an email from Match.com should typically have the \u201cFrom\u201d domain of \u201cmatch.com\u201d (not \u201chumbletemper.com&#8221;).<\/p>\n<p><strong><u>Example 2.<\/u><\/strong><\/p>\n<p style=\"text-align: center\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5921\" src=\"http:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/2-293x300.png\" alt=\"\" width=\"293\" height=\"300\" srcset=\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/2-293x300.png 293w, https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/2.png 492w\" sizes=\"auto, (max-width: 293px) 100vw, 293px\" \/><\/p>\n<p><strong><u>Example 3.<\/u><\/strong><\/p>\n<p style=\"text-align: center\"><strong><u><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-medium wp-image-5922\" src=\"http:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/3-300x188.jpg\" alt=\"\" width=\"300\" height=\"188\" srcset=\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/3-300x188.jpg 300w, https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/3-768x480.jpg 768w, https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/3.jpg 864w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/u><\/strong><\/p>\n<p><strong>Please follow this link to view more examples of phishing emails:<\/strong><\/p>\n<p><a href=\"http:\/\/www.phishing.org\/phishing-examples\">http:\/\/www.phishing.org\/phishing-examples<\/a><\/p>\n<p>Ultimately, using email safely is all about common sense. No legitimate business or organization will ever ask for your password or personal information. If something seems suspicious or too good to be true, it is most likely a phishing attempt. Simply delete the email.<\/p>\n<p><strong>Resource links:<\/strong><\/p>\n<p><a href=\"https:\/\/www.securingthehuman.org\/newsletters\/ouch\/issues\/OUCH-201112_en.pdf\">https:\/\/www.securingthehuman.org\/newsletters\/ouch\/issues\/OUCH-201112_en.pdf<\/a><\/p>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Phishing#Helping_to_identify_legitimate_websites\">https:\/\/en.wikipedia.org\/wiki\/Phishing#Helping_to_identify_legitimate_websites<\/a><\/p>\n<p><a href=\"http:\/\/www.phishing.org\/phishing-techniques\">http:\/\/www.phishing.org\/phishing-techniques<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What do you do? You check your email and find a message from your bank threatening to close your account if you don\u2019t reply immediately with your contact information, or an email arrives from a business associate that includes a link to a web site that you don\u2019t recognize. You&#8217;ve gotten email from them before, &#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/\">[Read more&#8230;]<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[1],"tags":[],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-ddevenney","4":"post-5919","6":"format-standard","7":"category-uncategorized"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Month: Email Phishing and How to Protect Yourself - Weekly Rounds<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Month: Email Phishing and How to Protect Yourself - Weekly Rounds\" \/>\n<meta property=\"og:description\" content=\"What do you do? You check your email and find a message from your bank threatening to close your account if you don\u2019t reply immediately with your contact information, or an email arrives from a business associate that includes a link to a web site that you don\u2019t recognize. You&#8217;ve gotten email from them before, ... [Read more...]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/\" \/>\n<meta property=\"og:site_name\" content=\"Weekly Rounds\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-03T21:09:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-10-03T21:10:15+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1-300x91.jpg\" \/>\n<meta name=\"author\" content=\"ddevenney\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ddevenney\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/\",\"url\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/\",\"name\":\"Cybersecurity Month: Email Phishing and How to Protect Yourself - Weekly Rounds\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1-300x91.jpg\",\"datePublished\":\"2017-10-03T21:09:58+00:00\",\"dateModified\":\"2017-10-03T21:10:15+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#\/schema\/person\/fb4dea96c34aae30281f6ebcebaf8684\"},\"breadcrumb\":{\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#primaryimage\",\"url\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1.jpg\",\"contentUrl\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1.jpg\",\"width\":570,\"height\":173},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Month: Email Phishing and How to Protect Yourself\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#website\",\"url\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/\",\"name\":\"Weekly Rounds\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#\/schema\/person\/fb4dea96c34aae30281f6ebcebaf8684\",\"name\":\"ddevenney\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d600b9e0fdf91f48ebb3096e79500e825d83feed1ef49bff9edb03de1189e1a8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d600b9e0fdf91f48ebb3096e79500e825d83feed1ef49bff9edb03de1189e1a8?s=96&d=mm&r=g\",\"caption\":\"ddevenney\"},\"url\":\"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/author\/ddevenney\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Month: Email Phishing and How to Protect Yourself - Weekly Rounds","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Month: Email Phishing and How to Protect Yourself - Weekly Rounds","og_description":"What do you do? You check your email and find a message from your bank threatening to close your account if you don\u2019t reply immediately with your contact information, or an email arrives from a business associate that includes a link to a web site that you don\u2019t recognize. You&#8217;ve gotten email from them before, ... [Read more...]","og_url":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/","og_site_name":"Weekly Rounds","article_published_time":"2017-10-03T21:09:58+00:00","article_modified_time":"2017-10-03T21:10:15+00:00","og_image":[{"url":"http:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1-300x91.jpg","type":"","width":"","height":""}],"author":"ddevenney","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ddevenney","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/","url":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/","name":"Cybersecurity Month: Email Phishing and How to Protect Yourself - Weekly Rounds","isPartOf":{"@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#primaryimage"},"image":{"@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#primaryimage"},"thumbnailUrl":"http:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1-300x91.jpg","datePublished":"2017-10-03T21:09:58+00:00","dateModified":"2017-10-03T21:10:15+00:00","author":{"@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#\/schema\/person\/fb4dea96c34aae30281f6ebcebaf8684"},"breadcrumb":{"@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#primaryimage","url":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1.jpg","contentUrl":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/files\/2017\/10\/1.jpg","width":570,"height":173},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/2017\/10\/cybersecurity-month-email-phishing-and-how-to-protect-yourself\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Month: Email Phishing and How to Protect Yourself"}]},{"@type":"WebSite","@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#website","url":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/","name":"Weekly Rounds","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#\/schema\/person\/fb4dea96c34aae30281f6ebcebaf8684","name":"ddevenney","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d600b9e0fdf91f48ebb3096e79500e825d83feed1ef49bff9edb03de1189e1a8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d600b9e0fdf91f48ebb3096e79500e825d83feed1ef49bff9edb03de1189e1a8?s=96&d=mm&r=g","caption":"ddevenney"},"url":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/author\/ddevenney\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/posts\/5919","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/comments?post=5919"}],"version-history":[{"count":2,"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/posts\/5919\/revisions"}],"predecessor-version":[{"id":5924,"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/posts\/5919\/revisions\/5924"}],"wp:attachment":[{"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/media?parent=5919"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/categories?post=5919"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.cooperhealth.org\/weeklyrounds\/wp-json\/wp\/v2\/tags?post=5919"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}