Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Expand
titleBut you weren't expecting it...

Try calling them to check.

How can we recognize phishing attacks?

Although making the time to check details can seem impossible, try to take a minute to notice a few things.

  • Does the name in the subject match the From: address?
  • What does the To: address say?
  • Are you listed in To: or in Bcc: (you should be in To:).
  • As with most spam, check for extra typos.

Viewing a file that is shared with you should not prompt you to approve additional access. Always pay close attention to WHO is asking for WHAT access, and consider carefully whether they need it or not (this is true of the apps you install on your phone, as well!).

...

Do you think your account was compromised?

There are a few things you should do if you think you've been phished.

...