Phishing: How to Protect Yourself from Phishing Attacks
How to Protect Yourself From Phishing Attacks
Your email spam filters may keep many phishing emails out of your inbox. But scammers are always trying to outsmart spam filters, so it’s a good idea to add extra layers of protection. Here are four steps you can take today to protect yourself from phishing attacks.
Four Steps to Protect Yourself From Phishing
1. Protect your computer by using security software. Set the software to update automatically so it can deal with any new security threats.
2. Protect your mobile phone by setting software to update automatically. These updates could give you critical protection against security threats.
3. Protect your accounts by using multi-factor authentication. Some accounts offer extra security by requiring two or more credentials to log in to your account. This is called multi-factor authentication. The additional credentials you need to log in to your account fall into two categories:
Something you have—like a passcode you get via text message or an authentication app.
Something you are—like a scan of your fingerprint, your retina, or your face.
Multi-factor authentication makes it harder for scammers to log in to your account if they do get your username and password.
4. Protect your data by backing it up. Back up your data and make sure those backups aren’t connected to your home network. You can copy your computer files to an external hard drive or cloud storage. Back up the data on your phone, too.
Related Articles
How to Recognize Phishing
How to Recognize Phishing Scammers often update their tactics, but there are some signs that will help you recognize a phishing email or text message. Phishing emails and text messages may look like they’re from a company you know or trust. They may ...
How to Report Phishing
If a suspicious email is received, do not click any links, scan QR codes, reply, etc. Instead, forward the email to fraud@sdsu.edu
Phising - Coupon for Free Stuff
Coupon for free stuff It’s Pizza Hut’s 55th anniversary, the email says, and you can join in the celebration by getting a free pizza at any of its restaurants. Just click on the “Get Free Pizza Coupon” button. Don’t do it. There’s no free pizza. ...
Spotting Fraudulent Emails
Spotting Fraudulent Emails SOCIAL ENGINEERING RED FLAGS Below are signs the email message below are fraudulent. =====================SAMPLE MESSAGE BELOW======================= From: "gkoliako" gkoliako@auth.gr> Date: March 31, 2019 at ...
Sensitive Data Storage
SENSITIVE DATA STORAGE Sensitive Data Storage Best Practices As an employee of SDSU, you are responsible for all university data that is sent, stored, or shared on all personal or university-owned devices that you use. Part of this responsibility ...