Phishing

Overview

Protect Yourself Against Phishing

How to Recognize Phishing Attempts

Phishing attempts come in many forms, and are often disguised as legitimate e-mails from IT departments asking for account information. Many of these attempts have links that forward users to a web site in an effort to collect personal or confidential information.

If you believe that you have fallen victim to a phishing attempt and have inadvertently provided your password, immediately reset your password, call the IT HelpDesk at x4357, and forward a copy of the email as an attachment to reportaphish@lbcc.edu. The sooner you change your password and inform IITS, the more likely you are to prevent further disruption to the institution.

When people provide account information to cyber criminals, it negatively affects school business. LBCC is often unable to send email to anyone outside the institution, including students, and IITS is forced to spend time outside of normal work hours, including weekends and holidays, repairing the damage.

Social Engineering and Phishing

In technology, the term social engineering is used to describe the use of deception to lure people into revealing personal and/ or confidential information with the intent of using that information for fraudulent purposes. Social engineering spans various modes of communication and is often used to target specific groups.

Phishing is a form of social engineering that uses email, and often includes more focused schemes such as spear-phishing (appears to be from someone you know), and whaling (high value targets such as executives). Other forms include vishing (over the phone) and smishing (via phone texts).

Indicators of a Phishing Attempt

Most phishing attempts include more than one of the following.

  • Never Supply Log-In Credentials

    Never supply your log-in credentials (user ID and password) or personally identifiable information in response to any email.

  • Suspicious Sender Address

    The From address typically contains an email address you do not recognize or is something similar to a real organization but looks odd enough to warrant suspicion.

  • Suspicious Links

    Before clicking on anything, hover your mouse over each link to display the real hyperlink. If it is unrecognizable or looks suspicious, do not click on it.

  • Attachments

    An email may ask you to open attachments that, in turn, contain buttons or links to perform the action specified in the email (access a document, change your password, etc.).

    Do not open an attachment that you are uncertain of, especially if it’s a type of document you do not recognize.

  • Threats

    Many phishing attempts use threats or create a sense of urgency. For instance, it may stipulate that your account will be terminated, suspended, expire, etc., so you need to reset your password or verify your account information. Do not respond to threats or pressure tactics — legitimate business do not use these tactics.

  • Poor Spelling and Bad Grammar

    While legitimate organizations typically have copy editors to prevent low quality emails, cyber-criminals are known for poor spelling and bad grammar.

  • Website Spoofing

    Some phishing attempts include the look and feel of commonly known vendors and services (PayPal, Office 365, etc.) but there are usually significant visual differences. When in doubt, go directly to the real website instead of using the link.

Examples of Phishing Attempts

Norton antivirus provides a few visual examples to help you identify phishing attempts. With that in mind, be aware that perpetrators have used the Long Beach City College logo against employees in an attempt to lure victims.

Remember, if the email content, from address, link destination, or URL of the website looks questionable, do not click, use, or reply. Simply forward a copy of the email as an attachment to reportaphish@lbcc.edu, and IITS will look into it.

Videos on Phishing

What is Phishing And How Can I Protect Myself? (2:28)

Video courtesy of AARP.

Additional Videos

Online Phishing Quizzes

Test your newly acquired skills by taking one or more of the following:

Common Types of Scams

Phishing is used to facilitate a variety of scams. Click on one of the following links to learn more about a specific scam.

    Additional Resources

     

    Post

    Protect your password

    Administration Regulation 6006 specifically prohibits the sharing of login credentials. Never provide your password to anyone: not your coworker, not your boss, not IITS.