PhishingScamming method used to elicitinformation from uninformed computerusers through impersonation of trustedsources; respelling of fishing used toevade scans and filters by mainstreamservers policing the internet.
MalwareAnycode, program, script, software orany instructions interpreted asattacking a computer operatingsystem. Malwareincludes spyware, trojans, viruses denial of service/DoS attacks.
Both have a similar delivery. Emailmessages will contain:1. Threats2. Company Logo or Name3. Links4. +/- misspelled words and typos
When you get suspected phishing ormalware email:Enter your organization’s preferred method ofhandling phishing and malware. It is importantthat these be reported as soon as possible sosecurity measures can be taken.
If you/your user clicked on a link and/orentered username and password information(credit card #, social security #, etc):
• Notify your Department IT and get yourpasswords reset.• Run a virus scan.• If you provided a login or account details for afinancial institution, call them immediately.
SpamUnsolicited e-mail sent out inmass quantities.
When you receive spam:1. Mark the message as spam2. Create rules/filters to blockfuture spam messages.3. Delete the message.