

{"id":17126,"date":"2020-07-13T14:18:17","date_gmt":"2020-07-13T18:18:17","guid":{"rendered":"https:\/\/www.uvm.edu\/it\/dev\/kb\/?post_type=ht_kb&#038;p=17126"},"modified":"2023-03-13T10:45:50","modified_gmt":"2023-03-13T14:45:50","slug":"managing-online-safety","status":"publish","type":"ht_kb","link":"https:\/\/www.uvm.edu\/it\/dev\/kb\/article\/managing-online-safety\/","title":{"rendered":"Managing Online Safety: Phishing and Spam"},"content":{"rendered":"<p>This guide contains information on detecting fraudulent online communications, mitigating the damage of a successful phishing or spam attack, and preventing future security breaches.<\/p>\n<h2>What is Phishing?<\/h2>\n<p>Phishing is the fraudulent attempt to obtain sensitive information, or data, such as usernames, passwords and credit card details by disguising oneself as a trustworthy entity in an electronic communication. Typically carried out by email spoofing or instant messaging, phishing often directs users to enter personal information at a fake website which matches the look and feel of the legitimate site. (<a href=\"https:\/\/en.wikipedia.org\/wiki\/Phishing\">Wikipedia<\/a>)<\/p>\n<p>Spam and Phishing attacks are the most common security concern that you will encounter in daily operations. While UVM <a href=\"https:\/\/www.uvm.edu\/it\/kb\/article\/proofpoint\">does employ email filters<\/a> to help mitigate this issue, it is important to be able to identify and protect yourself from online fraud.<\/p>\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Examples of Phishing Attempts<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>These are some common examples of phishing or spam attempts. If you see a communication that looks like these, please take extra precaution.<\/p>\n<p><figure id=\"attachment_17192\" aria-describedby=\"caption-attachment-17192\" style=\"width: 643px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2020\/07\/phish.png\" rel=\"lightbox-0\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-17192\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2020\/07\/phish-1024x237.png\" alt=\"\" width=\"643\" height=\"149\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/phish-1024x237.png 1024w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/phish-300x69.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/phish-768x178.png 768w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/phish-50x12.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/phish-60x14.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/phish-100x23.png 100w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/phish.png 1228w\" sizes=\"auto, (max-width: 643px) 100vw, 643px\" \/><\/a><figcaption id=\"caption-attachment-17192\" class=\"wp-caption-text\">An attempt to steal UVM credentials. This email links to a page impersonating UVM and asking for your information.<\/figcaption><\/figure>\n<\/p>\n<p><figure id=\"attachment_17176\" aria-describedby=\"caption-attachment-17176\" style=\"width: 673px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2020\/07\/job_offer.png\" rel=\"lightbox-1\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17176\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2020\/07\/job_offer.png\" alt=\"\" width=\"673\" height=\"396\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/job_offer.png 673w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/job_offer-300x177.png 300w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/job_offer-50x29.png 50w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/job_offer-60x35.png 60w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/job_offer-100x59.png 100w\" sizes=\"auto, (max-width: 673px) 100vw, 673px\" \/><\/a><figcaption id=\"caption-attachment-17176\" class=\"wp-caption-text\">A fraudulent job offer. Emails like this are meant to entice recipients to give out personal information in hopes of receiving money or a job. Note that the sender&#8217;s name and email address do not match.<\/figcaption><\/figure>\n<\/p>\n<p><figure id=\"attachment_17182\" aria-describedby=\"caption-attachment-17182\" style=\"width: 750px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2020\/07\/marketing.png\" rel=\"lightbox-2\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-17182\" src=\"https:\/\/kb.helpline.w3.uvm.edu\/wp-content\/uploads\/2020\/07\/marketing.png\" alt=\"Unsolicited marketing email\" width=\"750\" height=\"815\" srcset=\"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/marketing.png 801w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/marketing-276x300.png 276w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/marketing-768x834.png 768w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/marketing-46x50.png 46w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/marketing-55x60.png 55w, https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-content\/uploads\/2020\/07\/marketing-92x100.png 92w\" sizes=\"auto, (max-width: 750px) 100vw, 750px\" \/><\/a><figcaption id=\"caption-attachment-17182\" class=\"wp-caption-text\">An unsolicited marketing email. This particular email links to a form requesting your contact information. Never give out your personal information to a site that you do not recognize. Note that this particular message has been labeled as potential spam by UVM&#8217;s filter system.<\/figcaption><\/figure>\n<\/p>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Potential Consequences<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>The consequences of a successful phishing attack can vary greatly in severity &#8211; from only requiring a password change, to requiring that you contact your bank to cancel credit cards or a governmental institution in the case of a stolen Social Security Number.<\/p>\n<p>Phishing attacks are a serious threat to the individual and to our institution. They are regularly successful in stealing information from politicians and other important figures, along with causing grave breaches in organizations like hospitals.<\/p>\n<p>For some context on how serious the results of an attack like this can be, see the following articles:<\/p>\n<ul>\n<li><a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2019\/02\/sophisticated-phishing-a-roundup-of-noteworthy-campaigns\/\">MalwareBytes Blog: &#8220;Sophisticated phishing: a roundup of noteworthy campaigns&#8221;<\/a><\/li>\n<li><a href=\"https:\/\/www.businessinsider.com\/hillary-clinton-campaign-john-podesta-got-hacked-by-phishing-2016-10?amp\">Business Insider: &#8220;Hillary Clinton&#8217;s campaign got hacked by falling for the oldest trick in the book&#8221;<\/a><\/li>\n<li><a href=\"https:\/\/zix.com\/Resources\/Blog\/August-2019\/12-Recent-Education-Email-Attacks\">Zix.com: &#8220;12 Email Security Incidents Involving U.S. Education Institutions&#8221;<\/a><\/li>\n<\/ul>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n<h2>Identifying and Reporting a Phishing Attempt<\/h2>\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Check for Common Red Flags<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>The following are some common indicators that an email is not legitimate. The presence of these warning signs does not guarantee that an email is fraudulent, but you should exercise caution when you see them.<\/p>\n<table class=\"gold-header\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<thead>\n<tr>\n<th scope=\"col\">Red Flag Type<\/th>\n<th scope=\"col\">Example<\/th>\n<th scope=\"col\">Why it&#8217;s suspicious<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Fake FROM Address<\/td>\n<td>An email sent from <b>&#8220;someone@uvm-edu.com&#8221;<\/b><\/td>\n<td>Attackers use email addresses that look like they come from inside your organization in an attempt to appear legitimate. Check the FROM address on an email to make sure that it is actually from who it claims.<\/td>\n<\/tr>\n<tr>\n<td>Fake Link Addresses<\/td>\n<td>An email with a link like: <b>http:\/\/uvmedu.xyzsites.com\/passwordform<\/b><\/td>\n<td>This link is meant to look like its destination is a UVM site, but actually links to an unknown page. Real links to UVM sites will always contain &#8220;uvm.edu&#8221; and should start with &#8220;http<b>s<\/b>&#8220;.<\/td>\n<\/tr>\n<tr>\n<td>Urgent or Threatening Subject Line<\/td>\n<td>Subject: <b>&#8220;we have footage of you&#8221;<\/b><\/td>\n<td>Attackers use scare tactics like claiming to possess compromising photos or personal information in order to extort access or money. These claims are rarely true, and are just meant to scare the recipient into complying.<\/td>\n<\/tr>\n<tr>\n<td>Misspellings and Improper Grammar<\/td>\n<td>An email containing the sentence: <b>&#8220;I installed mine malwareo nto your device&#8221;<\/b><\/td>\n<td>This is a common tactic used by attackers when sending mass emails. &#8220;Mistakes&#8221; like this help ensure that only people more likely to fall for their scam respond to the initial email.<\/td>\n<\/tr>\n<tr>\n<td>Demanding or Asking For Money<\/td>\n<td>An email claiming to possess footage of you and containing demands like: <b>&#8220;If you wish to destroy the videotape- transfer me 319 euro in Bitcoins&#8221;<\/b><\/td>\n<td>Legitimate emails will never ask for money like this, and a scammer&#8217;s claims to possess incriminating materials are highly unlikely to be true.<\/td>\n<\/tr>\n<tr>\n<td>Suspicious Attachments<\/td>\n<td>An email from someone you don&#8217;t know with an attachment like <b>&#8220;financial_report.pdf&#8221;<\/b> or <b>&#8220;holidayVacation.exe&#8221;<\/b><\/td>\n<td>Certain file types, like PDF files, videos, and even Word documents, can contain hidden programs which can be used to steal your information and control your computer. Other potentially dangerous files, like EXE files, can be disguised by giving them a misleading name. Never open attachments from someone you do not trust.<\/td>\n<\/tr>\n<tr>\n<td>Offers that are &#8220;Too Good To Be True&#8221;<\/td>\n<td>An email containing an offer like this: <b>&#8220;We wish to congratulate you for being the winner of 650,000.00 USD in the recent Publishers Clearing House E- mail Lottery.Kindly send your contacts to lottowinoffice@null.net&#8221;<\/b><\/td>\n<td>Scammers use offers like this to trick recipients into giving out private information like bank details or contact information.<\/td>\n<\/tr>\n<tr>\n<td>Asking For A Password<\/td>\n<td>An unexpected email asking for your password or providing a reset link.<\/td>\n<td>You will never be asked to send your password in a legitimate email. If a link asks you to sign in or enter other information, make sure that the URL looks correct.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Ask the Tech Team<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>If you are unsure whether a specific email is fraudulent, please feel free to contact the Help Line for us to take a look:\u00a0<a href=\"https:\/\/www.uvm.edu\/it\/kb\/contact\/\">https:\/\/www.uvm.edu\/it\/kb\/contact\/<\/a><\/p>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Report Possible Phishing Attempts<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>Incoming email at UVM goes through <a href=\"https:\/\/www.uvm.edu\/it\/kb\/article\/proofpoint\">Proofpoint, an anti-spam, anti-malware, and anti-phishing service<\/a>. If you receive email that appears to be malicious, but was not tagged by Proofpoint, please <a href=\"https:\/\/www.uvm.edu\/it\/kb\/article\/forwarding-full-mail-headers\/\">forward full mail headers<\/a>\u00a0to\u00a0<a href=\"mailto:abuse@uvm.edu\">abuse@uvm.edu<\/a>.<\/p>\n<p>You may also\u00a0<a href=\"https:\/\/www.uvm.edu\/it\/kb\/contact\/\">contact the UVM Tech Team<\/a>\u00a0who may work with our Systems Administrators to address this issue.<\/p>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>View Additional Online Resources<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>The following online resources contain more information on detecting spam and protecting yourself from future attacks.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.consumer.ftc.gov\/articles\/how-recognize-and-avoid-phishing-scams\">FTC: How to Recognize and Avoid Phishing Scams<\/a><\/li>\n<li><a href=\"https:\/\/phishingquiz.withgoogle.com\/\">Phishing Quiz: Test Your Spam Identification Skills<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Phishing\">Wikipedia: Phishing<\/a><\/li>\n<li><a href=\"https:\/\/haveibeenpwned.com\/\">Have I Been Pwned?: Check for compromised accounts<\/a><\/li>\n<\/ul>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n<h2>What To Do if You&#8217;ve Been Compromised<\/h2>\n    \t\t<div class=\"hts-messages hts-messages--danger  hts-messages--withtitle hts-messages--withicon \"   >\r\n    \t\t\t<span class=\"hts-messages__title\">Check for Suspicious Inbox Rules<\/span>    \t\t\t    \t\t\t\t<p>\r\n    \t\t\t\t\tAfter gaining access to an email account, an attacker will often create an inbox rule that deletes incoming messages. After regaining access, <a href=\"https:\/\/www.uvm.edu\/it\/kb\/article\/filtering-emails-in-owa\/#creating-an-email-filter\">check your inbox rules<\/a>.    \t\t\t\t<\/p>\r\n    \t\t\t    \t\t\t\r\n    \t\t<\/div><!-- \/.ht-shortcodes-messages -->\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Change your Passwords<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>When one of your accounts becomes compromised, it&#8217;s possible that other accounts you own may have been compromised as well. This is especially true when\u00a0you use the same password for multiple sites or have an account under the same email address on many sites.<\/p>\n<p>After one of your accounts is compromised, the safest thing to do is change passwords for all your other accounts.\u00a0While this is likely to be a difficult task, it may be useful to focus on certain types of account for extra precaution, such as:<\/p>\n<ul>\n<li>School and Work Accounts (UVM)\n<ul>\n<li>Change your NetID password at <a href=\"https:\/\/account.uvm.edu\/change-password\">https:\/\/account.uvm.edu\/change-password<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Bank and Credit Accounts<\/li>\n<li>Social Media (Facebook, LinkedIn, etc.)<\/li>\n<li>Shopping (Amazon, Ebay, etc.)<\/li>\n<\/ul>\n<p>These sites contain sensitive data and extra care should be taken with potential compromised credentials.<\/p>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Monitor your Accounts<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>If you think someone may have gained access to an account of yours, be on the lookout for suspicious activities that you did not perform:<\/p>\n<ul>\n<li>Unfamiliar Purchases or Charges (Shopping Sites or Credit Cards)<\/li>\n<li>Strange Messages to Friends or other Acquaintances (Social Media or Email)<\/li>\n<\/ul>\n<p>If you see suspicious activity on your UVM account, <a href=\"https:\/\/account.uvm.edu\/change-password\">change your password immediately<\/a>. If you encounter suspicious activities on another account, change your password and contact that organization immediately. This is especially important for things like credit cards and bank accounts.<\/p>\n<p>If you think someone may have your Social Security Number or other sensitive information, see these pages from the FTC for help with preventing and recovering from identity theft:<\/p>\n<ul>\n<li><a href=\"https:\/\/www.consumer.ftc.gov\/features\/feature-0014-identity-theft\">FTC: &#8220;Recovering From Identity Theft&#8221;<\/a><\/li>\n<li><a href=\"https:\/\/www.usa.gov\/identity-theft\">USA.gov: &#8220;Identity Theft&#8221;<\/a><\/li>\n<\/ul>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n<h2>Managing your Online Safety<\/h2>\n<p>Below are some methods and precautions to help you to protect yourself from spam and phishing attacks online.<\/p>\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Proofpoint Spam Filtering<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>UVM&#8217;s email server uses Proofpoint to filter spam messages from your inbox. Emails that the program thinks are spam will be marked in the subject line with something like &#8220;[SPAM &#8211; DEFINITE]&#8221; or &#8220;[SPAM?:****]&#8221;.<\/p>\n<p><a href=\"https:\/\/www.uvm.edu\/it\/kb\/article\/proofpoint\">Please see our dedicated guide on the Proofpoint Spam filter for more information.<\/a><\/p>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Passwords<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>If you are worried that someone may have gained access to any of your online accounts, it is strongly encouraged that you change the password for that account immediately.<\/p>\n<p><a href=\"https:\/\/account.uvm.edu\/change-password\">Click here to change your UVM password.<\/a><\/p>\n<p><div class=\"hts-messages hts-messages--alert  hts-messages--withtitle hts-messages--withicon \"   >\n    \t\t\t<span class=\"hts-messages__title\">Locked Accounts<\/span>    \t\t\t    \t\t\t\t<\/p>\n<p>If UVM&#8217;s security admins see suspicious activity on your account, such as logins from outside of the country, they will lock your account to prevent further damage. If you are unexpectedly unable to sign into UVM sites, please <a href=\"https:\/\/www.uvm.edu\/it\/kb\/contact\/\">contact the Help Line.<\/a><\/p>\n<\/p><\/div>\n<p><!-- \/.ht-shortcodes-messages -->\n    \t\t<\/p>\n<p>You can also help to protect your accounts by using strong passwords. Strong passwords are usually made up of a combination of different types of characters, like numbers, lower and uppercase letters, and punctuation.<\/p>\n<p>The most important measure of a strong password however, is length.<\/p>\n<p>For this reason, UVM requires passwords to be at least 12 characters long and contain at least two character types. It is strongly recommended that you use the same level of precaution when creating passwords for other sites. You should not reuse passwords.<\/p>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Helpful Programs<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>There are several freely available programs that can help you protect yourself from Spam and Phishing attacks, and help to mitigate the consequences of a successful attack.<\/p>\n<table class=\"gold-header\" border=\"1\" cellspacing=\"1\" cellpadding=\"1\">\n<thead>\n<tr>\n<th scope=\"col\">Program Name<\/th>\n<th scope=\"col\">Purpose<\/th>\n<th scope=\"col\">Download Page<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Malwarebytes Anti-Malware<\/td>\n<td>Scans your computer for malicious programs and helps to remove any found. Cost: Free (with premium option)<\/td>\n<td><a href=\"https:\/\/www.malwarebytes.com\/\">https:\/\/www.malwarebytes.com\/<\/a><\/td>\n<\/tr>\n<tr>\n<td>Ad-Blockers (Browser Extensions)<\/td>\n<td>Remove advertisements from websites you visit. Web advertisements can often contain scams and malware. Please note that some sites will ask you to disable these extensions.<\/td>\n<td>Where to find extensions for each major browser:<br \/>\n<a href=\"https:\/\/chrome.google.com\/webstore\/category\/extensions\">Google Chrome<\/a><br \/>\n<a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/extensions\/\">Mozilla Firefox<\/a><br \/>\n<a href=\"https:\/\/support.apple.com\/guide\/safari\/get-extensions-sfri32508\/mac\">Apple Safari<\/a><br \/>\n<a href=\"https:\/\/www.microsoft.com\/en-us\/store\/collections\/edgeextensions\/pc\">Microsoft Edge<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n    \t\t<div class=\"hts-toggle  \"  >\r\n    \t\t\t<div class=\"hts-toggle__title\"><h3>Keeping Up To Date<\/h3><\/div>\r\n    \t\t\t<div class=\"hts-toggle__content\">\r\n    \t\t\t\t<div class=\"hts-toggle__contentwrap\">\r\n    \t\t\t\t\t<\/p>\n<p>Another important method for maintaining your computer&#8217;s security is keeping it fully updated when possible. Official instructions for running updates on each major operating system can be found at these links:<\/p>\n<ul>\n<li><a href=\"https:\/\/support.apple.com\/guide\/mac-help\/get-macos-updates-mchlpx1065\/mac\">macOS (Apple)<\/a><\/li>\n<li><a href=\"https:\/\/support.microsoft.com\/en-us\/help\/4027667\/windows-10-update\">Windows 10 (Microsoft)<\/a><\/li>\n<li><a href=\"https:\/\/ubuntu.com\/tutorials\/upgrading-ubuntu-desktop#1-before-you-start\">Ubuntu Linux (Canonical)<\/a><\/li>\n<li><a href=\"https:\/\/support.google.com\/chromebook\/answer\/177889?hl=en\">Chrome OS (Google)<\/a><\/li>\n<\/ul>\n<p>Computers managed by UVM also have software that is capable of installing updates or applications.<\/p>\n<ul>\n<li>Windows: <a href=\"https:\/\/www.uvm.edu\/it\/kb\/article\/sccm\/\">Software Center &#8211; SCCM<\/a><\/li>\n<li>macOS: <a href=\"https:\/\/www.uvm.edu\/it\/kb\/article\/managed-software-center\/\">Managed Software Center<\/a><\/li>\n<\/ul>\n<p>\n    \t\t\t\t<\/div>\r\n    \t\t\t<\/div><!-- \/ht-toggle-content -->\r\n    \t\t<\/div>\r\n    \t\t\n","protected":false},"excerpt":{"rendered":"<p>This guide contains information on detecting fraudulent online communications, mitigating the damage of a successful phishing or spam attack, and preventing future security breaches. What is Phishing? Phishing is the fraudulent attempt to obtain sensitive information, or data, such as usernames, passwords and credit card details by disguising oneself as&#8230;<\/p>\n","protected":false},"author":68,"comment_status":"closed","ping_status":"closed","template":"","format":"standard","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"ht-kb-category":[254,270],"ht-kb-tag":[387,458,404,457],"class_list":["post-17126","ht_kb","type-ht_kb","status-publish","format-standard","hentry","ht_kb_category-accounts","ht_kb_category-security","ht_kb_tag-email","ht_kb_tag-phish","ht_kb_tag-security","ht_kb_tag-spam"],"_links":{"self":[{"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb\/17126","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb"}],"about":[{"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/types\/ht_kb"}],"author":[{"embeddable":true,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/users\/68"}],"replies":[{"embeddable":true,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/comments?post=17126"}],"version-history":[{"count":76,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb\/17126\/revisions"}],"predecessor-version":[{"id":24214,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb\/17126\/revisions\/24214"}],"wp:attachment":[{"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/media?parent=17126"}],"wp:term":[{"taxonomy":"ht_kb_category","embeddable":true,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb-category?post=17126"},{"taxonomy":"ht_kb_tag","embeddable":true,"href":"https:\/\/www.uvm.edu\/it\/dev\/kb\/wp-json\/wp\/v2\/ht-kb-tag?post=17126"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}