Share

Now, more than ever, people are sharing personal information about themselves online. Technology allows us to connect with others, bank and shop, even monitor your house or car online. With these conveniences also comes an increased risk of identity theft and Internet scams. Every time we connect to the Internet, we are forced to make decisions that affect our cyber security.

Phishing attacks use email or malicious websites to seek out personal information by posing as a trustworthy organization. For example, an attacker may send email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there is a problem. When users respond with the requested information, attackers can use it to gain access to the accounts. The Department of Homeland security has issued a tip card to help users protect themselves from Phishing attacks. The following info graphic will help you know how to recognize phishing email messages, links, or phone calls.

phish1 phish2 phish3

Scroll to Top