{"id":1825,"date":"2021-08-05T13:22:08","date_gmt":"2021-08-05T13:22:08","guid":{"rendered":"https:\/\/support.wcsu.edu\/?post_type=ht_kb&#038;p=1825"},"modified":"2023-12-11T19:32:02","modified_gmt":"2023-12-11T19:32:02","slug":"what-is-phishing","status":"publish","type":"ht_kb","link":"https:\/\/support.wcsu.edu\/?ht_kb=what-is-phishing","title":{"rendered":"What is Phishing?"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">\u00a0Phishing attacks account for more than 80% of reported security incidents. Phishing is sending emails to people posing as someone who you are not in hopes of obtaining information. $17,700 is lost every minute due to phishing attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In our generation, phishing is one of the biggest tactics hackers use to obtain information.\u00a0 There are many different types of phishing emails; it is important to be made aware of what to look out for when trying to steer away from attackers. By being aware, you are much less likely to fall victim to a cyberattack.<\/span><\/p>\n<p><strong>Looking for Grammar Mistakes<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Deceptive phishing is the most common type of phishing. Deceptive phishing uses threats as well as urgency to scare people into doing what they want. An example of this is PayPal scammers, sending out an attack email with a link. The link redirects people to a \u201cfake PayPal\u201d where if you put in your information, the scammers will obtain it. One way to tell if an email is a part of deceptive phishing is by looking at grammar mistakes as well as spelling errors. Additionally, if you were ever to get an email claiming for someone to be PayPal, email the corporate PayPal email as opposed to the one that sent you that. The following is an example of deceptive phishing.<\/span><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-1829\" src=\"https:\/\/support.wcsu.edu\/wp-content\/uploads\/2021\/08\/Capture-300x279.png\" alt=\"\" width=\"446\" height=\"415\" srcset=\"https:\/\/support.wcsu.edu\/wp-content\/uploads\/2021\/08\/Capture-300x279.png 300w, https:\/\/support.wcsu.edu\/wp-content\/uploads\/2021\/08\/Capture-768x714.png 768w, https:\/\/support.wcsu.edu\/wp-content\/uploads\/2021\/08\/Capture-50x46.png 50w, https:\/\/support.wcsu.edu\/wp-content\/uploads\/2021\/08\/Capture-60x56.png 60w, https:\/\/support.wcsu.edu\/wp-content\/uploads\/2021\/08\/Capture-100x93.png 100w, https:\/\/support.wcsu.edu\/wp-content\/uploads\/2021\/08\/Capture.png 846w\" sizes=\"auto, (max-width: 446px) 100vw, 446px\" \/><\/p>\n<p><strong>Analyzing Emails<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">Spear Phishing is when the attacker makes their username something the victim would be familiar with. At WCSU, we see this all the time. Attackers will change their email to a professor\u2019s name and email collogues and students, posing as the professor. It is important to analyze email addresses before replying. Emails from people inside the university will end in @wcsu.edu. Additionally, if an email is suspicious, it will say \u201cthis email has been sent to you outside of your organization.\u201d Being aware of the existence of Spear Phishing will prevent further attacks.<\/span><\/p>\n<p><strong>Reporting Incidents<\/strong><\/p>\n<p><span style=\"font-weight: 400;\">When falling victim to a malware attack through your WCSU email, it is important to follow the reporting procedure outlined in the link below.<\/span><\/p>\n<p><a href=\"https:\/\/support.wcsu.edu\/?ht_kb=do-you-think-you-received-a-phishing-email\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">https:\/\/support.wcsu.edu\/?ht_kb=do-you-think-you-received-a-phishing-email<\/span><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00a0Phishing attacks account for more than 80% of reported security incidents. Phishing is sending emails to people posing as someone who you are not in hopes of obtaining information. $17,700 is lost every minute due to phishing attacks. In our generation, phishing is one of the biggest tactics hackers use&#8230;<\/p>\n","protected":false},"author":4,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"footnotes":""},"ht-kb-category":[19],"ht-kb-tag":[],"class_list":["post-1825","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-security"],"_links":{"self":[{"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/ht-kb\/1825","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1825"}],"version-history":[{"count":0,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=\/wp\/v2\/ht-kb\/1825\/revisions"}],"wp:attachment":[{"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1825"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fht-kb-category&post=1825"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/support.wcsu.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fht-kb-tag&post=1825"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}