![]() Documents that require macros to be enabled. ![]() ![]() Attachments with file extensions that do not match the function (e.g., the attachment is named Attachment.exe but the file should be a PDF).Attachments with two file extensions (e.g., ).A sender email address that does not match who the email claims to be from (e.g., an email posing as USC, sent from instead of Links that do not go to the URL they advertise (e.g., a link claiming to go to Amazon but using the URL.Inconsistencies in email addresses, links or domain names.Urgent action requests that threaten negative consequences.To avoid falling subject to a phishing email, keep an eye out for the following warning signs: ![]() Phishing is a common type of email scam used to elicit sensitive or confidential information. This page provides ITS’s recommendations on best practices for securing both USC’s data and your personal information.įor additional information on the latest security threats, phishing attempts, and critical software and operating system patches, follow the ITS security blog at. In today’s nearly paperless culture, it is increasingly important to protect sensitive and confidential information. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |