%PDF-1.3 1 0 obj << /Type /Catalog /Outlines 2 0 R /Pages 3 0 R >> endobj 2 0 obj << /Type /Outlines /Count 0 >> endobj 3 0 obj << /Type /Pages /Kids [6 0 R ] /Count 1 /Resources << /ProcSet 4 0 R /Font << /F1 8 0 R /F2 9 0 R /F3 10 0 R /F4 11 0 R >> >> /MediaBox [0.000 0.000 612.000 792.000] >> endobj 4 0 obj [/PDF /Text ] endobj 5 0 obj << /Creator (DOMPDF) /CreationDate (D:20220127053831+00'00') /ModDate (D:20220127053831+00'00') /Title (IT-artikels) >> endobj 6 0 obj << /Type /Page /Parent 3 0 R /Annots [ 12 0 R 14 0 R ] /Contents 7 0 R >> endobj 7 0 obj << /Length 4361 >> stream 0.702 0.800 0.816 rg 34.016 34.016 543.969 723.969 re f 1.000 1.000 1.000 rg 45.266 266.794 521.469 479.940 re f 0.773 0.773 0.773 RG 0.75 w 0 J [ ] 0 d 45.641 267.169 520.719 479.190 re S 0.773 0.773 0.773 rg 61.016 617.359 m 550.984 617.359 l 550.984 618.109 l 61.016 618.109 l f 1.000 1.000 1.000 rg BT 278.868 698.693 Td /F1 10.5 Tf [(POST LIST)] TJ ET 0.200 0.200 0.200 rg BT 212.789 670.111 Td /F1 14.4 Tf [(INFORMASIETEGNOLOGIE)] TJ ET BT 221.824 643.466 Td /F1 11.7 Tf [(INFORMATION TECHNOLOGY)] TJ ET BT 61.016 583.841 Td /F1 14.4 Tf [(HOW DO I REPORT PHISHING?)] TJ ET 0.400 0.400 0.400 rg BT 61.016 564.033 Td /F3 9.0 Tf [(You've received a suspicious email, what should you do with it? Firstly, don't click on any links. But just as important, send )] TJ ET BT 61.016 553.044 Td /F3 9.0 Tf [(it to us so we can prevent more staff and students falling prey to the scam. We encourage our customers to submit )] TJ ET BT 61.016 542.055 Td /F3 9.0 Tf [(potential phishing examples for review. Using these submissions, the Cyber Security Incident Response Team \(CSIRT\) )] TJ ET BT 61.016 531.066 Td /F3 9.0 Tf [(can learn from the analysis of these messages. This collectively helps to improve the level of virus and spam detection.)] TJ ET BT 61.016 511.077 Td /F4 9.0 Tf [(What is phishing?)] TJ ET BT 61.016 491.088 Td /F3 9.0 Tf [(Phishing attacks are designed to steal a personís login and password details so that the cyber criminal can assume control )] TJ ET BT 61.016 480.099 Td /F3 9.0 Tf [(of the victimís social network, email, and online bank accounts. Seventy percent of internet users choose the same )] TJ ET BT 61.016 469.110 Td /F3 9.0 Tf [(password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same )] TJ ET BT 61.016 458.121 Td /F3 9.0 Tf [(login details, can access multiple private accounts and manipulate them for their own good.†)] TJ ET 0.373 0.169 0.255 rg BT 61.016 438.132 Td /F3 9.0 Tf [(More on how to recognise a phishing email.†)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 61.016 436.981 m 237.092 436.981 l S 0.200 0.200 0.200 rg BT 61.016 418.143 Td /F4 9.0 Tf [(REPORT PHISHING)] TJ ET 0.400 0.400 0.400 rg BT 61.016 398.154 Td /F4 9.0 Tf [(On the ICT Partner Portal:)] TJ ET 0.400 0.400 0.400 RG 85.866 380.981 m 85.866 381.394 85.696 381.803 85.404 382.095 c 85.113 382.387 84.703 382.556 84.291 382.556 c 83.878 382.556 83.469 382.387 83.177 382.095 c 82.885 381.803 82.716 381.394 82.716 380.981 c 82.716 380.569 82.885 380.159 83.177 379.868 c 83.469 379.576 83.878 379.406 84.291 379.406 c 84.703 379.406 85.113 379.576 85.404 379.868 c 85.696 380.159 85.866 380.569 85.866 380.981 c f BT 91.016 378.165 Td /F3 9.0 Tf [(Go to†)] TJ ET 0.373 0.169 0.255 rg BT 115.532 378.165 Td /F3 9.0 Tf [(https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115)] TJ ET 0.373 0.169 0.255 RG 0.18 w 0 J [ ] 0 d 115.532 377.014 m 412.649 377.014 l S 0.400 0.400 0.400 rg 0.400 0.400 0.400 RG 85.866 369.992 m 85.866 370.405 85.696 370.814 85.404 371.106 c 85.113 371.398 84.703 371.567 84.291 371.567 c 83.878 371.567 83.469 371.398 83.177 371.106 c 82.885 370.814 82.716 370.405 82.716 369.992 c 82.716 369.580 82.885 369.170 83.177 368.879 c 83.469 368.587 83.878 368.417 84.291 368.417 c 84.703 368.417 85.113 368.587 85.404 368.879 c 85.696 369.170 85.866 369.580 85.866 369.992 c f BT 91.016 367.176 Td /F3 9.0 Tf [(Fill in your information and add the email as an attachment. Your request will automatically be logged on the )] TJ ET BT 91.016 356.187 Td /F3 9.0 Tf [(system.?)] TJ ET BT 61.016 336.198 Td /F4 9.0 Tf [(*Spam or phishing examples must be sent in either.EML or .MSG format as an attachment and must not be )] TJ ET BT 61.016 325.209 Td /F4 9.0 Tf [(forwarded. This ensures the original email can be analysed with its full Internet message headers intact.†)] TJ ET BT 61.016 314.220 Td /F3 9.0 Tf [(Alternatively, use the mail application to save the email \(usually located under File | Save As\) as an .EML or .MSG format )] TJ ET BT 61.016 303.231 Td /F3 9.0 Tf [(to a folder location, and attach the saved file to a new email.)] TJ ET BT 61.016 284.742 Td /F3 9.0 Tf [(Posted in:Phishing,Security,Tips | Tagged:Malware,Phishing,Report Phishing,Report Spam,Spam | With 0 comments)] TJ ET endstream endobj 8 0 obj << /Type /Font /Subtype /Type1 /Name /F1 /BaseFont /Helvetica-Bold /Encoding /WinAnsiEncoding >> endobj 9 0 obj << /Type /Font /Subtype /Type1 /Name /F2 /BaseFont /Helvetica /Encoding /WinAnsiEncoding >> endobj 10 0 obj << /Type /Font /Subtype /Type1 /Name /F3 /BaseFont /Helvetica-Oblique /Encoding /WinAnsiEncoding >> endobj 11 0 obj << /Type /Font /Subtype /Type1 /Name /F4 /BaseFont /Helvetica-BoldOblique /Encoding /WinAnsiEncoding >> endobj 12 0 obj << /Type /Annot /Subtype /Link /A 13 0 R /Border [0 0 0] /H /I /Rect [ 61.0157 437.2996 237.0917 446.4571 ] >> endobj 13 0 obj << /Type /Action /S /URI /URI (http://blogs.sun.ac.za/it/en/2016/10/how-to-recognise-a-phishing-e-mail/) >> endobj 14 0 obj << /Type /Annot /Subtype /Link /A 15 0 R /Border [0 0 0] /H /I /Rect [ 115.5317 377.3326 412.6487 386.4901 ] >> endobj 15 0 obj << /Type /Action /S /URI /URI (https://servicedesk.sun.ac.za/jira/servicedesk/customer/portal/6/create/115) >> endobj xref 0 16 0000000000 65535 f 0000000008 00000 n 0000000073 00000 n 0000000119 00000 n 0000000305 00000 n 0000000334 00000 n 0000000469 00000 n 0000000558 00000 n 0000004971 00000 n 0000005083 00000 n 0000005190 00000 n 0000005306 00000 n 0000005426 00000 n 0000005553 00000 n 0000005677 00000 n 0000005805 00000 n trailer << /Size 16 /Root 1 0 R /Info 5 0 R >> startxref 5932 %%EOF How do I report phishing? « Informasietegnologie
Language:
SEARCH
  • Recent Posts

  • Categories

  • Archives

How do I report phishing?

You’ve received a suspicious email, what should you do with it? Firstly, don’t click on any links. But just as important, send it to us so we can prevent more staff and students falling prey to the scam. We encourage our customers to submit potential phishing examples for review. Using these submissions, the Cyber Security Incident Response Team (CSIRT) can learn from the analysis of these messages. This collectively helps to improve the level of virus and spam detection.

What is phishing?

Phishing attacks are designed to steal a person’s login and password details so that the cyber criminal can assume control of the victim’s social network, email, and online bank accounts. Seventy percent of internet users choose the same password for almost every web service they use. This is why phishing is so effective, as the criminal, by using the same login details, can access multiple private accounts and manipulate them for their own good. 

More on how to recognise a phishing email. 

Report phishing

On the ICT Partner Portal:

*Spam or phishing examples must be sent in either.EML or .MSG format as an attachment and must not be forwarded. This ensures the original email can be analysed with its full Internet message headers intact. Alternatively, use the mail application to save the email (usually located under File | Save As) as an .EML or .MSG format to a folder location, and attach the saved file to a new email.

Tags: , , , ,

Comments are closed.

 

© 2013-2022 Disclaimer: The views and opinions expressed in this page are strictly those of the page author(s) and content contributor(s). The contents of this page have not been reviewed or approved by Stellenbosch University.