Phishing and Spam

Phishing is a serious, persistent and evolving threat

Phishing is an attempt to acquire confidential information such as account passwords, identification numbers or credit card details by pretending to be a trusted entity in electronic communications including email, texting and instant messaging.  Phishing is dangerous and can lead to financial risk and identity theft.   At UNH, 3 to 5 different phishing emails are typically reported by community members, every day! 

Spam is a nuisance akin to junkmail sometimes used by legitimate businesses and organizations and is typically not a severe risk for the receiver. Spam from a UNH email account may indicate a user's account or computer has been compromised and should be reported.

[Do you think it's a phishing attempt? Check here first!]

Warning signs of phishing:

SENSITIVE INFORMATION:  Phishing asks you for sensitive information such as your account passwords, Social Security Number, credit card numbers, or UNH ID number.  Legitimate businesses and organizations do not request or provide sensitive information via email.

"CLICK HERE":  Phishing often presents links or attachments and urges you to click to respond, read information or view pictures.  In some cases, just clicking the link or attachment can infect your computer.

FALSE URGENCY:  Phishing makes threats such as termination of services if you don't respond immediately .  They want you to respond  before  you think! 

UNEXPECTED MESSAGE:   Be wary of emails you didn't expect to receive, even those that appear to come from a business you deal with or someone you know. 

COPY LEGITIMATE SOURCES:  Phishing pretends to be from a trusted source such as UNH, your bank or well-known delivery companies and may include recognizable logos, addresses or names.

ODD GRAMMAR:  Phishing may contain odd grammar, misspellings or unusual capitalization.  These emails often originate from regions where the writers are not familiar with English.   

What should you do?

If you believe you have received a phishing or spam email:

  • Go to the phishbowl to see if it is a known phishing attempt
  • Do not respond or reply to the email in any way; replying shows that your email address is real and can lead to further attacks.
  • Don't click on any link in a suspicious email; just clicking a link can open your computer to attack from a virus or other malware.
  • Don't open or print any attachment to the email; attachments may contain malicious code which can take over your computer.
  • Delete an unverified suspicious email and purge from your 'Deleted' mail folder.
  • Verify a suspicious email by contacting the sender by phone; use a publicly available number, not any number contained in the email to make the call.  At UNH, you can also contact ISS or the IT Service Desk to validate messages.  If there's no way to verify the email, treat it as phishing.

Report suspected phishing emails to:

Report spam emails to:

 

Additional useful and detailed information on phishing:

.

Video:   View our not-so-serious phishing video:  

Don't Be A Phish  from  UNH IT Security  on  Vimeo .

 

 

Custom Fields
  • Author: Rori Boyce
  • Department: Enterprise Technology Services
Attached Files
There are no attachments for this article.
Related Articles RSS Feed
Install ESET Mac Antivirus Software
Viewed 685 times since Wed, Mar 6, 2019
Recommended tools for SFTP/FTP
Viewed 920 times since Mon, Sep 10, 2018
Handle Data with Care
Viewed 189 times since Tue, May 7, 2019
Microsoft Security Essentials and Windows Defender Installation
Viewed 57449 times since Wed, Aug 12, 2015
Password Managers 101
Viewed 1254 times since Mon, Oct 16, 2017
SEED: Safe Electronic Equipment Disposal Instructions
Viewed 3426 times since Mon, Apr 27, 2015
Network Registration & Vulnerability Scans
Viewed 1842 times since Wed, Apr 29, 2015
FAQs- System Center 2012 Endpoint Protection, Microsoft Security Essentials, and Windows Defender
Viewed 6537 times since Wed, Aug 12, 2015
Using Facebook, Google or other Social Login Services
Viewed 1290 times since Fri, Aug 26, 2016
Encryption & Virus Protection
Viewed 4473 times since Wed, Apr 29, 2015
MENU