Expect to be targeted
Don't ever say "it won't happen to me". Everyone is a potential victim to cyber criminals.
- Never share your password with anyone.
- A good password will be strong, unique, and stored in a password manager.
- Be wary of implied sense of urgency or deadlines.
- If it sounds too good to be true, it probably is. Trust your gut!
Keep scrolling to find out how to recognise fraudulent communication and how to keep your passwords secure.
Come and play Cyberus
Manifold Games have been working with The Foundry to develop a new multiplayer game called Cyberus. Bring your friends and visit us during the event to be one of the first to try it out!
Phishing is a form of fraud that includes malicious emails.
They are designed to gain personal information and may appear to come from a genuine source.
Emails often include links to bogus websites or attachments, which appear to be normal files (for example, Word, Excel or PDF) and are harmful.
How to spot Phishing
IT Services have technical controls in place to filter out spam before it reaches your inbox, but Phishing techniques change and some will inevitably get through.
- Check who sent you the email.
Be particularly suspicious of emails asking for personal or financial information.
- Check the quality of emails.
Misspelling, poor punctuation and bad grammar are tell-tale signs of phishing.
- IT Services will never send you an email asking you to confirm your password.
- Never respond to any email which asks for your account details or requests you make a payment.
Make passwords difficult to guess by:
- using a unique password for every account
- using the three random words technique below
- never share your password with anyone for any reason
- using a password manager to store and suggest passwords
- mixing upper and lower case letters, along with numbers (0-9) and special characters (%^!#)
- using a minimum of 12 characters in length - always remember, longer is stronger.
The Information Security Toolkit is full of top tips and advice to help safeguard you, others and the University against cyber threats.