Protect yourself and GC from phishing attacks

  • 08/08/2024
  • IT Department

To ensure the security of our organisation, we want to remind you about the importance of protecting yourself from phishing attacks.

Phishing is a common method used by cybercriminals to steal sensitive information, and it's crucial that we all stay vigilant.

Here are some key tips to help you recognise and avoid phishing attempts:

  1. Recognise Phishing Emails:
  • Check the sender's email address: Ensure it matches the sender's real address.
  • Look for poor grammar and spelling: Phishing emails often contain errors.
  • Be cautious with links and attachments: Don't click on links or open attachments including links to systems like drop boxes (where normally from the sender you don’t receive such emails this way). Our best advice is, unless you're sure they're legitimate, do not click.

  1. Verify Requests for Sensitive Information:
  • Double-check before sharing sensitive information: Always verify requests for personal or financial information, especially if they seem urgent.
  • Use known contact methods: If in doubt, contact the sender through a known and trusted method.

  1. Report Suspicious Emails immediately:
  • If you receive a suspicious email, report it to the IT department immediately, who will be able to investigate the situation further.

For further awareness, below are some common examples of phishing emails to help you recognise them:

  • Fake Bank Alerts Example: An email claiming to be from your bank, warning you about suspicious activity on your account and asking you to click a link to verify your details.

  • Tech Support Scams Example: An email from ‘Microsoft Support’ stating that your computer has a virus, and you need to download an attachment or click a link to fix it.

  • Tax Refund Scams Example: An email pretending to be from the the Tax Office, informing you of a tax refund and asking for your personal information to process it.

  • Suspicious Activity Notices Example: An email from a familiar service like PayPal, alerting you to unusual login attempts and urging you to secure your account by clicking a provided link.

  • Fake Invoices Example: An email with an attached invoice for a service or product you never ordered, prompting you to open the attachment to see the details.

  • Social Media Phishing Example: An email that looks like it's from Facebook, claiming there's an issue with your account and asking you to log in through a provided link.

  • Delivery Scams Example: An email from a courier service like UPS, stating that they tried to deliver a package but failed, and asking you to click a link to reschedule the delivery.

  • CEO Fraud Example: An email that appears to be from the CEO, requesting urgent action such as transferring funds or sharing sensitive information.

  • Fake Rewards or Promotions Example: An email claiming you've won a prize or are eligible for a special promotion, asking you to click a link to claim your reward.

  • Account Suspension Emails Example: An email from a service like Netflix, warning that your account will be suspended unless you update your payment information immediately.

By following these guidelines, we can collectively protect GC from phishing attacks. If you have any questions or need further assistance, please don't hesitate to reach out to the IT department.

Stay safe and vigilant!

 

IT Services Team

E: ITServices@growthco.uk