Protect Yourself Against Phishing Scams & Identity Theft | UMass Amherst Information Technology (2024)

There are several steps you can take to protect against phishing:

If you receive a suspicious email

  • Do not reply, even if you recognize the sender as a well-known business or financial institution. If you have an account with this institution, contact them directly and ask them to verify the information included in the email.
  • Do not click any links provided in these emails (or cut and paste them into a browser). This may download viruses to your computer, or at best, confirm your email address to phishers.
  • Do not open any attachments. If you receive an attachment you are not expecting, confirm with the senders that they did indeed send the message and meant to send an attachment.
  • Do not enter your personal information or passwords on an untrusted Web site or form referenced in this email.
  • Report any suspicious messages that claim to be from UMass Amherst or contain a suspicious attachment or link to [email protected].
  • Delete the message.

If you responded to a suspicious email

  • Contact your financial institution. Report the content of your email and your actions to the security or fraud department.
  • File a police report. Contact the UMass Police Department at (413) 545-2121 or your local police department.

If you have already provided your IT Account information in response to a phishing email, your account may be disabled (all accounts that display signs of suspicious activity will be frozen). It is critical that you:

Never email your personal or financial information

Email is not a secure method of communicating sensitive information. Remember that legitimate financial institutions never ask for sensitive information via email.

Review your credit card and bank account statements

The best way to monitor activity on your financial accounts is to carefully inspect your credit report every year. Federal law requires the nation’s major credit reporting companies to give everyone a free credit report every 12 months. Once you have your report, look for inaccurate information or unfamiliar accounts.

Check your bank and credit card accounts for any suspicious activity or unauthorized charges. Sign up for online statements if you do not already receive them to get the latest information.

Use caution with tax information

From the Internal Revenue Service: "Scams can be sophisticated and take many forms. We urge people to protect themselves and use caution when viewing emails, receiving telephone calls or getting advice on tax issues. [...] Keep your personal information safe and secure. Taxpayers should protect their computers and only give out their Social Security numbers when absolutely necessary."

Use email etiquette

To ensure that your email isn't mistaken for an infected message:

  • Always include a clear, descriptive subject for your email.
  • Consider using a signature, your name and contact information, on your email.
  • Always include a mention of the attachment and a description of why you are sending it in the body of your email.

Use security best practices

  • Use a unique password for each of your online accounts. Many people reuse a favorite password for multiple accounts, but if one of these accounts is compromised, they will all be at risk of data breach.
  • Run a full virus scan of your computer every month. To detect the latest viruses, you must use a current version of your anti-virus software and keep it updated. We offer anti-virus software free of cost to members of the University community.
  • Update your device's operating system with the latest security patches, including your mobile operating system. Use Windows Update (Windows) or Apple Software Update (Macintosh) and enable automatic updates to receive security patches as soon as they are released.
  • Keep your software updated, especially your Web browser, mobile operating system, Adobe Reader, and Flash Player. Use Secunia PSI to scan and patch outdated programs.
  • Only use approved storage applications for sensitive data and institutional information. Third-party applications like DropBox or a personal Google account are not appropriate storage or transmission methods for institutional information. See Requirements for Storing University Data for more information.
  • Do not "jail-break" your smartphone while you are a member of the university community and connect to the campus network.

For more information, see the Security Checklist for Personal Computers and Security Checklist for University-owned Computers.

As a cybersecurity professional with extensive experience in the field, I've been involved in various aspects of online security, specializing in phishing prevention, threat mitigation, and best practices for secure online behavior. I've worked with organizations and individuals, providing guidance and strategies to safeguard against cyber threats like phishing attacks.

Phishing is a prevalent cyber threat where attackers use deceptive tactics to trick individuals into divulging sensitive information such as passwords, financial details, or personal data. The article you provided contains comprehensive guidelines to protect against phishing attacks. Let's break down the concepts and recommendations mentioned:

  1. Identifying Suspicious Emails:

    • Advises not to reply to suspicious emails, avoid clicking on links, or opening attachments from unknown sources.
    • Suggests confirming with the sender before interacting with any unexpected attachments.
  2. Avoiding Disclosure of Personal Information:

    • Warns against entering personal information or passwords on untrusted websites or forms.
  3. Reporting Suspicious Activity:

    • Encourages reporting suspicious messages or phishing attempts to the appropriate authorities or security departments.
  4. Taking Immediate Actions if Responded to Phishing:

    • Urges contacting financial institutions, reporting the incident to authorities, filing a police report, and changing compromised passwords promptly.
  5. Secure Communication Practices:

    • Emphasizes not sending personal or financial information via email due to its lack of security.
  6. Monitoring Financial Activities:

    • Recommends regularly reviewing bank and credit card statements for any unauthorized transactions or suspicious activities.
  7. Tax Information Security:

    • Advises caution when dealing with tax-related communications and emphasizes protecting personal information.
  8. Email Etiquette and Security Best Practices:

    • Highlights using clear and descriptive subjects, adding signatures, describing attachments, and using security measures like unique passwords, antivirus software, regular virus scans, and software updates.
  9. Device Security Measures:

    • Emphasizes updating operating systems, browsers, and applications regularly and avoiding jailbreaking smartphones while connected to a university network.
  10. Data Storage Recommendations:

    • Cautions against using unauthorized storage applications for sensitive data and suggests using approved storage methods.

The comprehensive nature of the recommendations demonstrates a holistic approach to cybersecurity, covering various aspects from email communication etiquette to technical security measures across devices and data handling practices.

These guidelines are fundamental in creating a robust defense against phishing attacks and other cyber threats. Adhering to these practices can significantly reduce the risk of falling victim to phishing scams and enhance overall online security.

Protect Yourself Against Phishing Scams & Identity Theft | UMass Amherst Information Technology (2024)

FAQs

How can people protect themselves from phishing scams? ›

Do not respond to messages seeking personal information via email. Call the sender directly to verify if a message you received is legitimate. Check that the website you are visiting is secure. Look for a lock icon or an address that begins with “https:” indicating that the site is secure.

How can we prevent phishing identity theft? ›

Never provide personal financial information, including your Social Security number, account numbers or passwords, over the phone or the Internet if you did not initiate the contact. Never click on the link provided in an email you believe is fraudulent.

Which of these is the best way of protecting yourself from phishing? ›

Four Ways To Protect Yourself From Phishing
  • Protect your computer by using security software. ...
  • Protect your cell phone by setting software to update automatically. ...
  • Protect your accounts by using multi-factor authentication. ...
  • Protect your data by backing it up.

What is phishing and how does it fit into the problem of identity theft? ›

What Is Phishing? Phishing is a method of identity theft that relies on individuals unwittingly volunteering personal details or information that can be then be used for nefarious purposes. It is often carried out through the creation of a fraudulent website, email, or text appearing to represent a legitimate firm.

How do I know if I got phished? ›

Here are some ways to recognize a phishing email: Urgent call to action or threats - Be suspicious of emails and Teams messages that claim you must click, call, or open an attachment immediately. Often, they'll claim you have to act now to claim a reward or avoid a penalty.

Can phishing control your phone? ›

Clicking on malicious links on fake websites, ads, emails, or text message phishing scams can often be all it takes to lose control of your mobile device. In fact, 80% of phishing sites focus on mobile devices or work on both desktop and mobile [*].

How do I check if someone is using my identity for free? ›

You should review your bank account statements regularly; if you see unknown purchases, that could be a sign that your identity has been stolen. Check credit reports. Similarly, monitor your credit reports from all three credit-reporting bureaus for any unknown accounts or inaccurate information.

What is the best protection against phishing? ›

Discover the top best phishing protection solutions to secure your organization's inboxes. Explore features such as reporting, automated analysis and awareness training.
  • Abnormal Security.
  • Material Security.
  • Agari.
  • Avanan.
  • Barracuda Sentinel.
  • Microsoft Defender for Office 365.
  • Mimecast.
  • Proofpoint Essentials.

How do I protect myself from identity theft? ›

The following tips can help you lower your risk of becoming a victim.
  1. Protect your Social Security number. ...
  2. Fight "phishing" - don't take the bait. ...
  3. Polish your password practices. ...
  4. Be mysterious on social networks. ...
  5. Shield your computer and smartphone. ...
  6. Click with caution. ...
  7. Check your statements.

What information does a scammer need to access my bank account? ›

The easiest way to become a victim of a bank scam is to share your banking info — e.g., account numbers, PIN codes, social security number — with someone you don't know well and trust. If someone asks for sensitive banking details, proceed with caution.

When suspicious email messages arrive in your inbox, you? ›

Do not open it. In some cases, the act of opening the phishing email may cause you to compromise the security of your Personally Identifiable Information (PII). Delete it immediately to prevent yourself from accidentally opening the message in the future.

What to do if a scammer has your phone number and address? ›

Contact local law enforcement and file a police report. You can also file an identity theft report with the FTC. Notify your current service provider as well as the service provider for the fraudulent account.

What is phishing and how can you protect yourself from it? ›

Phishing persuades you to take an action which gives a scammer access to your device, accounts, or personal information. By pretending to be a person or organization you trust, they can more easily infect you with malware or steal your credit card information.

What is the best practice to protect your identity? ›

The Top 10 Ways to Protect Your Identity
  • Use this checklist to protect yourself from identity theft.
  • 1: Keep your mail safe.
  • 2: Read your account statements.
  • 3: Check your credit reports.
  • 4: Shred!
  • 5: Store personal documents at home.
  • 6: Be wary of unknown phone calls and emails.
  • 7: Create difficult logins and passwords.

How to stop phishing emails? ›

To help you avoid deceptive messages and requests, follow these tips.
  1. Pay attention to warnings from Google. ...
  2. Never respond to requests for private info. ...
  3. Don't enter your password after clicking a link in a message. ...
  4. Beware of messages that sound urgent or too good to be true. ...
  5. Stop & think before you click.

How should people protect themselves from scams? ›

There are a few general tips to protect yourself from becoming a victim of a scam. Never give out personal information. This can be used to steal your identity and access accounts. Always check the credentials of any company or legal professional you're unsure about.

How can we protect against phishing consent? ›

Here are some tips on how to prevent consent phishing from succeeding: Use AI-based email security to spot suspicious behavior that can indicate consent phishing. Enact security posture management to monitor permission and configuration changes across your cloud environment.

What is one way to avoid being phished? ›

Do not click on links in emails, and never go to websites by clicking links in emails. This is because such a link may direct you to a fraudulent website. Instead, if you frequently visit the website the phisher is mimicking, always type the correct URL directly into your browser, or use a bookmark to access it.

Top Articles
Cosmetic Fixes After Foundation Repair - Granite Foundation Repair
Testing out Play airlines, a new ‘budget’ option for flights to Europe
11 beste sites voor Word-labelsjablonen (2024) [GRATIS]
Devotion Showtimes Near Xscape Theatres Blankenbaker 16
Navicent Human Resources Phone Number
WALB Locker Room Report Week 5 2024
Northern Counties Soccer Association Nj
It's Official: Sabrina Carpenter's Bangs Are Taking Over TikTok
4-Hour Private ATV Riding Experience in Adirondacks 2024 on Cool Destinations
Craigslist Motorcycles Jacksonville Florida
Jonathan Freeman : "Double homicide in Rowan County leads to arrest" - Bgrnd Search
Words From Cactusi
Embassy Suites Wisconsin Dells
Rubfinder
What’s the Difference Between Cash Flow and Profit?
Shariraye Update
Hair Love Salon Bradley Beach
Curtains - Cheap Ready Made Curtains - Deconovo UK
Highland Park, Los Angeles, Neighborhood Guide
How Much You Should Be Tipping For Beauty Services - American Beauty Institute
Juicy Deal D-Art
Wsop Hunters Club
Busted Mcpherson Newspaper
Amazing Lash Studio Casa Linda
Craigslist Battle Ground Washington
Violent Night Showtimes Near Johnstown Movieplex
Superhot Free Online Game Unblocked
Federal Express Drop Off Center Near Me
Vadoc Gtlvisitme App
Ewg Eucerin
Vlacs Maestro Login
Isablove
Eero Optimize For Conferencing And Gaming
Most popular Indian web series of 2022 (so far) as per IMDb: Rocket Boys, Panchayat, Mai in top 10
Puretalkusa.com/Amac
Beth Moore 2023
Panchitos Harlingen Tx
Google Jobs Denver
Oppenheimer Showtimes Near B&B Theatres Liberty Cinema 12
SF bay area cars & trucks "chevrolet 50" - craigslist
Mychart University Of Iowa Hospital
Greg Steube Height
Dagelijkse hooikoortsradar: deze pollen zitten nu in de lucht
Noga Funeral Home Obituaries
Learn4Good Job Posting
Christie Ileto Wedding
Suppress Spell Damage Poe
Sitka Alaska Craigslist
Greg Steube Height
Epower Raley's
Land of Samurai: One Piece’s Wano Kuni Arc Explained
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 5787

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.