Make a name for yourself, like Phishing.

You’re 7 minutes away from a page that shows who you are and what you do.


Security in Menlo Park, California

Take my class

If you are reading this after clicking on an email link, then sorry you have been pwned. This test email was sent as part of our ongoing efforts to raise security awareness. Those of you who deleted the email without clicking on the link, GREAT JOB! Unfortunately, 29 of you did click on the link and could have been compromised, if this were not a test. Please be careful when opening emails from unknown sources. Additional information on phishing is below.

What is Phishing:

Email is an essential part or our everyday communications. It is also one of the most common methods that hackers use to attempt to gain access to sensitive information. More than 90% of data breaches start with a phishing attack. “Phishing” uses fraudulent email messages designed to impersonate a legitimate person or organization and trick the recipient into downloading harmful attachments or divulging sensitive information, such as passwords, bank account numbers, and Social Security numbers.

Phishing scams can have a number of different goals. They may attempt to:

- Target your bank or credit card information

- Gain control of your computer and local network resources

- Gain access to your Quicken user accounts

Phishing scams typically attempt to take advantage of you by:

- Delivering file attachments that can infect your computer with harmful software

- Enticing you to click on links to web sites that infect your computer with harmful software

- Tricking you into sharing your username and password so hackers can gain access to your network or other sites

You can identify a phishing scam by looking for email messages have the following:

- e-mail address. Some applications/mail readers will show you the e-mail address alongside the "name". While the sender’s “name” can be spoofed easily, spoofing the actual e-mail address is much more difficult with our current mail security setup. This attribute is your best bet for verifying the sender.

- Bad grammar or spelling. Sometimes, messages are composed by speakers for whom English is a second language.

- Lack of or unprofessional signature. This usually comes down to whether or not you regularly e-mail this colleague, to properly recognize a difference in pattern of speech or in the format of their message, but trust your gut on this one.