Part 1: Spotting Phishing Emails
Before interacting with any unexpected email, run through these five checks:
[ ] The Sender Check: Does the "From" address match the person’s name exactly? (Look for typos like g00gle.com instead of google.com).
[ ] The Link Hover: If you hover your mouse over a link, does the URL in the bottom corner of your screen match where the email says it's going?
[ ] The Urgency Test: Is the email using "scare tactics" or extreme pressure to make you act quickly?
[ ] The Attachment Rule: Were you expecting this file? If it’s a .zip, .exe, or an unexpected Office doc, do not open it.
[ ] The "Too Good to Be True" Factor: Does it offer an unexpected prize, a sudden "bonus," or ask for your password to "verify" your identity?
? Common Phishing Tactics
The "Account Issue" Hook:
The Tactic: You receive an email saying there is "unusual activity" on your account or your "password has expired."
The Goal: To get you to click a link and enter your real password on a fake login page.
The "Executive Impersonation" (Whaling):
The Tactic: An email that looks like it’s from a CEO or Manager asking for a "quick favor," like buying gift cards for a client or transferring funds.
The Goal: To use the authority of a boss to bypass normal security procedures.
The "Missing Invoice" or "Shipping Update":
The Tactic: An email with an attachment labeled
Invoice_9921.pdfor a link to "track your missed package."The Goal: To get you to open a file that installs malware or a "keylogger" (which records everything you type).
The "Social Media Alert":
The Tactic: A notification claiming someone tagged you in a photo or sent you a private message.
The Goal: To exploit your curiosity and lead you to a site that steals your social media login.
☣️
Part 2:Malware Warning Signs
If your device starts doing any of the following, stop what you are doing:
Performance: Drastic slowdowns or "freezing."
Pop-ups: Random ads or fake "Virus Detected" warnings appearing on your desktop.
Battery/Fan: The device is getting hot or the battery is draining for no apparent reason.
Access: You are suddenly locked out of folders or files.
What to Do If You Suspect a Threat
Stop: Do not click any links, download attachments, or enter any credentials.
Verify: If the email claims to be from a colleague or a known brand, contact them through a separate, known-good channel (like a phone call or a new email you draft yourself).
Report: Use the "Report Phishing" button in your email client or forward the email to the Information Technology Department.
Disconnect: If you suspect malware has already been installed, disconnect from the Wi-Fi immediately to prevent the spread and alert IT.
☣️ Common Malware Delivery Tactics
Macro Malware: You open an Excel or Word doc that asks you to "Enable Content." Once you click that button, a hidden script (malware) runs in the background.
Drive-by Downloads: You visit a website—sometimes even a legitimate one that has been hacked—and malware starts downloading automatically without you clicking anything.
Software Updates: A pop-up appears while you're browsing that says "Your Chrome is out of date" or "Flash Player required." Clicking "Update" installs a virus instead.