Title: Safe Browsing Practices: How to Recognize and Avoid Phishing Attempts
Last Updated: 9-28-2023
Applicable to: Camin Cargo Control Employees
Overview:
Phishing is a form of cyber-attack where attackers masquerade as trustworthy entities to deceive individuals into providing sensitive information. Recognizing and avoiding these attempts is crucial to safeguarding personal and company data.
Objective:
This article aims to educate Camin Cargo Control employees on the common signs of phishing attempts and best practices for safe browsing.
Recognizing Phishing Attempts:
Unexpected Emails:
- Be cautious of emails from unknown senders or unexpected messages from known contacts.
Misspellings or Odd Wording:
- Phishing emails often contain spelling mistakes, grammatical errors, or unusual phrasing.
Suspicious Links:
- Hover over hyperlinks (without clicking) to see where they lead. If the address looks odd or doesn't match the sender's organization, be wary.
Requests for Personal or Financial Information:
- Legitimate organizations will never ask for sensitive information through email.
Threatening Language:
- Emails claiming you'll face dire consequences unless you act immediately are usually scams.
Safe Browsing Practices:
Verify Before Clicking:
- If you're unsure about an email's legitimacy, contact the sender directly using a known contact method.
Use Two-Factor Authentication (2FA):
- Enable 2FA on accounts to add an additional layer of security.
Check Website URLs:
- Ensure the website you're visiting starts with "https://" and look for a padlock symbol in the address bar.
Avoid Downloading Unknown Attachments:
- These could contain malware or viruses.
Stay Informed:
- Regularly educate yourself on the latest phishing tactics and techniques.
Precautions:
Never provide personal or company information in response to an email, even if it appears to be from a trusted source.
Regularly update and maintain antivirus software to detect and prevent malware.
If you believe you've encountered a phishing attempt, report it to the IT department immediately.
Other Support Articles That May Be Useful: