Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

What is phishing?

...

Panel
panelIconId1f9d0
panelIcon:face_with_monocle:
panelIconText🧐
bgColor#FFFAE6

Phase 1: Bait 🪱

If a person gets an email or text that looks legitimate and puts them in an urgent (or even low-profile) scenario, below are some things the person is prompted to do, but they should not:

  • Do not Click a link

  • Do not Download & Open an Attachment

  • Do not Scan a QR code

  • Do not Take a Specific Action (i.e. buy gift cards, send money, update information, etc.)

Panel
panelIconId1f6ab
panelIcon:no_entry_sign:
panelIconText🚫
bgColor#FFEBE6

Phase 2: Hook 🪝

If any of the above Phase 1 actions occur and a person follows through with the phishing email,

(potentially deploying undetected Malware/Spyware/Ransomware)

they are then redirected to a website that prompts them to type in their personal information.

(i.e. Name, Address, Credit Card, Social Security, etc.)

Panel
panelIconIdatlassian-warning
panelIcon:warning:
bgColor#FFBDAD

Phase 3: Catch 🎣

If the person submits their information from the previous Phase 2, the scammer behind the email uses the information to:

  • Create/access online accounts (financial, organizational, personal email)

  • Lock out the person from their accounts by changing login credentials

  • Make purchases/Transfer money from the person’s own funds

...

B) Identify Fraudulent Elements

- All email communications that Florida Polytechnic University faculty & staff have with students will

only be exchanged between their @floridapoly.edu addresses. Students are advised to avoid sending emails to faculty & staff from their personal emails (i.e. Gmail, Yahoo, AOL, etc.)

- Instructors are not allowed to email students about:

...