In recent weeks, you may have received phishing emails that look as though they are coming from Wake Forest University faculty, staff or students to other WFU users. It appears as if the WFU user is sharing important information in a document that requires your WFU username and password to access. Be skeptical when a message asks you to click on a link, especially when you do not know the person. Be even more aware when that link asks you for your password. If a website does ask for your credentials, feel free to contact the Information Systems Service Desk to determine if the request is valid.
Do not become a phishing victim:
- Set up Google 2-Step Verification for added security. This prevents hackers from being able to access your email account even if they have your password. Learn more at infosec.wfu.edu or contact the Service Desk.
- Be wary of all links in emails. If in doubt, contact the sender to validate the request.
- Never provide your personal information in response to emails.
- Malware is often delivered as an email attachment. Most common safe attachments are .doc, .docx, .ppt, .pptx, .xls, .xlsx. Don’t open attachments that end with .ws, .zip, .docm, .exe, .js, .scr
Did you get a phishing email and provide your personal information?
Change your password immediately and delete the message. If you have questions about changing your password, visit this link: http://is.wfu.edu/services/
Tis the season…
It’s tax season and every year new phishing attempts appear to come from the IRS. The IRS does not initiate contact with taxpayers by email, text messages or social media channels to request personal or financial information. Please forward any unsolicited email claiming to be from the IRS or an IRS-related function to firstname.lastname@example.org.
Want to learn more about phishing emails?
Review this helpful course from Lynda.com. Click the sign-in button in the top right corner.
If you have any questions or concerns about security-related topics, please contact the security team at email@example.com.