Phishing and How to Avoid It

Summary

Describes what a phishing e-mail is and what you can do when you receive one.

Body

Environment

Any email provider

 

Information

What is phishing?

Phishing is a deceptive tactic employed by cybercriminals to trick users into divulging confidential information, such as usernames, passwords, and birthdates, under the guise of a trustworthy entity. These malicious actors pose as legitimate contacts to gain access to sensitive data, which they then exploit for identity theft and other illicit activities. This form of social engineering enables attackers to acquire personal information, facilitating various criminal endeavors.

These emails may also be used to plant viruses and spyware on your computer. 

How to identify a phishing email:

  • Be cautious of emails that seem to come from familiar sources but that ask for personal or sensitive information.

  • Watch out for emails that mimic legitimate institutions, such as banks or companies.

  • Check links by hovering over them before clicking to verify their destination (This can typically be done by looking at the lower left corner of the window you are in).

  • Verify the URL of login pages before entering credentials. If it looks unusual, you may want to refrain from entering a username and password.

  • Look for spelling and grammar mistakes.

  • Be wary of emails that create a sense of urgency or threaten account closure.

  • Avoid responding to emails that ask for sensitive information like passwords or Social Security numbers. Legitimate businesses won't be requesting this via email. Be cautious if family, friends, or colleagues seem to be asking you for this information as this could be an indication that their account could be compromised.

 

What actions should I take if I receive an email that I believe is fraudulent?

If you are concerned about your GRCC account, contact the IT Support Desk at 616-234-4357 or by email via  ITSupport@grcc.edu.

Please note that forwarding the email you received will help in jumpstarting the investigation process.

In addition:

  • Do not respond to the email.
  • Do not click any link in the email.
  • Do not copy or load any attachments or images in the email.
  • Make sure your anti-virus software is up-to-date.
  • Scan your system for viruses or spyware.

Details

Details

Article ID: 14
Created
Wed 7/5/17 5:00 PM
Modified
Tue 5/21/24 10:35 AM

Related Services / Offerings

Related Services / Offerings (1)

Report a suspicious email to Information Technology