What is phishing?
...
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Phase 1: Bait 🪱If a person gets an email or text that looks legitimate and puts them in an urgent (or even low-profile) scenario, below are some things the person is prompted to do, but they should not:
|
Panel | ||||||||
---|---|---|---|---|---|---|---|---|
| ||||||||
Phase 2: Hook 🪝If any of the above Phase 1 actions occur and a person follows through with the phishing email, (potentially deploying undetected Malware/Spyware/Ransomware) they are then redirected to a website that prompts them to type in their personal information. (i.e. Name, Address, Credit Card, Social Security, etc.) |
Panel | ||||||
---|---|---|---|---|---|---|
| ||||||
Phase 3: Catch 🎣If the person submits their information from the previous Phase 2, the scammer behind the email uses the information to:
|
...
B) Identify Fraudulent Elements
- All email communications that Florida Polytechnic University faculty & staff have with students will
only be exchanged between their @floridapoly.edu addresses. Students are advised to avoid sending emails to faculty & staff from their personal emails (i.e. Gmail, Yahoo, AOL, etc.)
- Instructors are not allowed to email students about:
...