Cyber Security Awareness Poster

Phishing continues to be a popular method for cyber criminals to gain access to victims. Tactics continue to evolve as users become privy to techniques. Remain vigilant online and don’t be a phishing victim. Watch for phishing scams via email, phone, text, social media, or your web browser. Here are 5 clues that someone is trying to phish for your information:
- Urgency – Phishing attempts often create a sense of urgency to pressure you into taking quick action. Scammers may claim that your account is at risk, your payment information needs immediate verification, or you must act urgently to avoid a problem. This urgency can lead you to make hasty decisions without thinking critically, which is exactly what phishers want.
- Grammatical errors – Many phishing emails or messages contain noticeable grammatical and spelling errors. These errors can indicate that the message is not from a legitimate source, as professional organizations typically review and edit their communications carefully. Phishers may not pay as much attention to language and may make frequent mistakes.
- Unusual requests and odd file types – Be wary of emails or messages that request unusual actions or provide attachments with odd file extensions. Phishers may ask you to download files like .exe (executable) or .zip without a clear, legitimate reason. Opening such files can lead to malware infections or data breaches.
- Suspicious hyperlinks – Phishing emails often include links that appear legitimate but lead to fake websites designed to steal your information. You can identify these links by hovering your mouse cursor over them to see the actual URL before clicking. Pay attention to URLs that look slightly altered or contain misspelled domain names, as these are common tactics used by phishers. Pay particular attention if the email or text is unsolicited.
- Mismatched emails / domains – Check the sender’s email address and domain to see if they match the organization they claim to represent. Phishers may use email addresses that closely resemble legitimate ones but have slight variations, such as “example@legit-site.com” vs. “example@Iegit-site.com” (note the difference in the letter “l” (el) and “I” (eye)). If the email domain doesn’t match the official domain of the organization, it’s a red flag.
Remember, phishing attempts often rely on psychological tactics like urgency and prey on inattentiveness by using grammatical errors, unusual requests, suspicious hyperlinks, and mismatched email addresses to trick individuals into divulging sensitive information or taking harmful actions. Being vigilant and skeptical when encountering these clues can help you avoid falling victim to phishing attacks.
CourseVector grants permission to use this artwork for any non-commercial purpose as long as the CourseVector contact information remains, as is, on any reproduction or use.