{"id":13806,"date":"2019-05-24T11:11:52","date_gmt":"2019-05-24T09:11:52","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=13806"},"modified":"2019-07-16T11:28:30","modified_gmt":"2019-07-16T09:28:30","slug":"how-to-avoid-phishing-scams","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2019\/05\/how-to-avoid-phishing-scams\/","title":{"rendered":"[:en]How to avoid phishing scams[:af]Hoe om phishing-pogings te fnuik[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>We are often asked by staff and students what they can do to stop phishing scams, and what software they should install to prevent them from becoming victims. In some cases students have asked us to fix their computers and to install software to block phishing scams.<\/p>\n<p>Of course that request is impossible to fulfil. Phishing scams are like the common cold. Just like you cannot prevent the common cold, you can only adopt a lifestyle, and take precautionary measures to reduce your risk of infection. They will always be there and will always adapt and change. As long as there are people who are uninformed or careless who fall for these scams, phishing attacks will continue.<\/p>\n<p>The best way to reduce your risk is to report all suspected phishing scams on <a href=\"https:\/\/servicedesk.sun.ac.za\">ICT Partner Portal<\/a>. (Full details at the end of this post). Here are some basic rules to help you to identify phishing scams:<\/p>\n<ul>\n<li><strong>Use common sense<br \/>\n<\/strong>Never click on links, download files or open attachments in email or social media, even if it appears to be from a known, trusted source.<\/li>\n<li><strong>Watch out for shortened links<br \/>\n<\/strong>Pay particularly close attention to shortened links. Always place your mouse over a web link in an email (known as \u201chovering\u201d) to see if you\u2019re being sent to the right website.<\/li>\n<li><strong>Does the email look suspicious?<br \/>\n<\/strong>Read it again. Many phishing emails are obvious and will have implausible and generally suspicious content.<\/li>\n<li><strong>Be wary of threats and urgent deadlines<br \/>\n<\/strong>Threats and urgency, especially coming from what claims to be a legitimate company, are a giveaway sign of phishing. Ignore the scare tactics and rather contact the company via phone.<\/li>\n<li><strong>Browse securely with HTTPS<br \/>\n<\/strong>Always, where possible, use a secure website, indicated by https:\/\/ and a security \u201clock\u201d icon in the browser\u2019s address bar, to browse.<\/li>\n<li><strong>Never use public, unsecured Wi-Fi, including Maties Wi-Fi, for banking, shopping or entering personal information online<br \/>\n<\/strong>Convenience should never be more important than safety.<\/li>\n<\/ul>\n<p>If you do receive a phishing e-mail, please report it as soon as possible. Once you have reported the spam or phishing mail, you can delete it immediately.<\/p>\n<p>You can report this on IT&#8217;s request logging system, the ICT Partner Portal.<\/p>\n<ul>\n<li>Go to the\u00a0<a href=\"https:\/\/servicedesk.sun.ac.za\/jira\/servicedesk\/customer\/portal\/6\/create\/115\">ICT Partner Portal.<\/a><\/li>\n<li>Fill in your information and add the email as an attachment. Your request will automatically be logged on the system and the appropriate measures will be taken by the system administrators to protect the rest of campus.<\/li>\n<\/ul>\n<p style=\"text-align: right;\">[ARTICLE BY DAVID WILES]<\/p>\n<p>[:af]<\/p>\n<p>Ons word dikwels deur personeel en studente gevra wat hulle kan doen om <em>phishing-<\/em>aanvalle te stop en watter sagteware hulle kan installeer om te voorkom dat hulle slagoffers daarvan word<em>. <\/em>In sommige gevalle het studente selfs versoek dat hulle rekenaars reggemaak moet word en sagteware installeer moet word om phishing-aanvalle te blok.<\/p>\n<p>Ongelukkig is dit \u0149 onmoontlike versoek. Net soos jy \u0149 gewone verkoue nie kan voorkom nie, maar eerder \u0149 spesifieke lewensstyl\u00a0 en voorkomende maatre\u00ebls kan toepas om die risiko vir besmetting te voorkom, geld dieselfde vir <em>phishing<\/em>-aanvalle. En net soos verkoues, gaan kubersekuriteitsrisiko&#8217;s altyd daar wees en sal hulle aanpas en verander. Solank daar mense is wat oningelig of nalatig is, sal <em>phishing<\/em>-aanvalle voortduur.<\/p>\n<p>Die beste manier om jou risiko te verminder is om alle agterdogtige phishing-pogings aan te meld op die <a href=\"https:\/\/servicedesk.sun.ac.za\">ICT Partner Portal<\/a>. (Meer volledige inligting aan die einde van hierdie artikel) Intussen is hier `n paar basiese re\u00ebls wat jou kan help om phishing uit te ken:<\/p>\n<ul>\n<li><strong>Gebruik logika<br \/>\n<\/strong>Moet nooit op skakels kliek, l\u00eaers aflaai or aanhangsels oopmaak in e-pos of sosiale media nie, selfs al lyk dit of dit van \u0149 bekende, betroubare bron kom.\u00a0<\/li>\n<li><strong>Oppas vir kort skakels<br \/>\n<\/strong>Kyk veral krities na kort skakels. Hou altyd die muis oor `n webskakel in \u0149 e-pos (bekend as \u201chovering\u201d) om te kyk of jy na die regte webwerf herlei word.\u00a0<\/li>\n<li><strong>Lyk die e-pos verdag?<br \/>\n<\/strong>Lees dit weer. Baie phishing e-posse is voor-die-hand-liggend en sal onoortuigende en algemeen verdagte inhoud bevat.<\/li>\n<li><strong>Wees versigtig vir dreigemente en dringende spertye<br \/>\n<\/strong>Dreigemente en dringendheid, veral komende van \u0149 skynbaar egte maatskappye, gee gou die phishing-poging weg. Ignoreer die bangmaaktruuks en kontak eerder die maatskappy telefonies.\u00a0<\/li>\n<li><strong>Navigeer eerder veilig met HTTPS<br \/>\n<\/strong>Gebruik altyd, waar moontlik `n veilige webwerf, aangedui deur https:\/\/ en `n \u201cslot\u201d ikoon in die blaaier se adresstaaf.<\/li>\n<li><strong>Moet nooit publieke, onsekure Wi-Fi vir banksake, aankope of invoer van persoonlike inligting gebruik nie \u2013 dit sluit Maties Wi-Fi in<br \/>\n<\/strong>Gerief behoort nooit meer belangrik as veiligheid te wees nie.\u00a0<\/li>\n<\/ul>\n<p>Wanneer jy \u0149 phishing e-pos ontvang, rapporteer dit so gou as moontlik. Daarna kan jy dit dadelik uitvee.\u00a0<\/p>\n<p>Jy kan dit rapporteer op die IT se versoekaantekenstelsel, die ICT Partner Portal.<\/p>\n<ul>\n<li>Gaan na die <a href=\"https:\/\/servicedesk.sun.ac.za\/jira\/servicedesk\/customer\/portal\/6\/create\/115\">ICT Partner Portal.<\/a><\/li>\n<li>Vul jou inligting in en heg die e-pos as \u0149 aanhangsel aan. Jou versoek sal outomaties aangeteken word en die nodige maatre\u00ebls sal getref word deur ons stelseladministrateurs om die res van die kampus te beskerm.<\/li>\n<\/ul>\n<p style=\"text-align: right;\">[ARTIKEL DEUR DAVID WILES]<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] We are often asked by staff and students what they can do to stop phishing scams, and what software they should install to prevent them from becoming victims. In some cases students have asked us to fix their computers and to install software to block phishing scams. Of course that request is impossible to [&hellip;]<\/p>\n","protected":false},"author":61,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20381,29187,48737],"tags":[54494,20381,54496],"class_list":["post-13806","post","type-post","status-publish","format-standard","hentry","category-phishing","category-security-2","category-tips-2","tag-cyber-security","tag-phishing","tag-report-phishing"],"publishpress_future_action":{"enabled":false,"date":"2026-05-09 17:36:15","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13806","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/61"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=13806"}],"version-history":[{"count":11,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13806\/revisions"}],"predecessor-version":[{"id":13817,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/13806\/revisions\/13817"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=13806"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=13806"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=13806"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}