Skip Content

The University of Texas at Arlington
menuMENU
  • Report an Incident
  • Home
  • Security Awareness
  • Policies and Standards
  • Risk Management
  • Contact Us
search
clear

Current Newsletters

  • May 2021 Newsletter

    May 2021 Newsletter - Incident Response

  • March 2021 Newsletter

    March 2021 Newsletter - Incident Response

  • January 2021 Newsletter

    January 2021 Newsletter - Incident Response

Getting Phished

December 2018

Getting Phished

From advance-fee scams to spoofed email addresses, phishing has long been the go-to attack in the social engineer’s playbook. In this month’s issue, we cover why phishing works via a real-life example, and highlight the obvious signs of an attack with a phishing identification checklist. From there, we cover the perils of ransomware attacks, which have surged in 2018, and wrap things up by illustrating how organizations can defend against the ever-dangerous Advanced Persistent Threats.

  1. Name three signs of a phishing email. (Bad grammar/spelling, unrealistic offers, threatening language, a sense of urgency, unexpected attachment, a call-to-action, unrecognizable address)
  2. True or False: if an email comes from someone you know, there’s no way it’s a phishing attack. (False)
  3. With one wrong click, this type of attack could lock up our entire organization’s networks. (Ransomware)
  4. Never allowing someone else to use your credentials for any reason is an example of what? (Respecting privileged access)
  5. By always doing this, you help strengthen our organization’s security posture and prevent unnecessary risks. (Following policy)

Read the full newsletter on SharePoint ยป

Information Security Office

Box 19800, Arlington, Texas 76019

Phone 817-272-5487 | Fax 817-272-2612

security@uta.edu

© 2022 The University of Texas at Arlington
Students | Faculty & Staff | Accessibility | Site Policies | Privacy and Legal Notice

Contact the webmaster