91³Ô¹Ï

 

 

Each employee has a responsibility to protect data, computers, mobile devices and physical areas. Never leave sensitive reports on your desk for a sustained period of time. Change passwords especially if you shared them with an associate. Think before clicking; the percentage ofÌý phishing URL traffic is over four (4) million per day. Don't take the bait.Ìý

ÌýAsk yourself these questions:ÌýÌý

  • Who is this from?Ìý
  • Why would that person send this email?Ìý
  • Why does the tone not match the sender?Ìý
  • Why are there spelling errors?Ìý
  • Why do they want me to click on a link?Ìý
  • Why would they send me this file?Ìý

When in doubt…Ìý

1.Ìý Stop: Don’t click links or open files
2.Ìý Read: Carefully, look for red flags
3.Ìý Confirm: Call the person sending
4.Ìý Consult: GSU ITS Help DeskÌý

Ìý

  • Tips on Spotting a Phish

    +

    • Verify the email source.
    • Look for typos and other errors.
    • Check links before clicking on them.
    • ITS will never ask you for your password.