{"id":9180,"date":"2016-01-13T14:16:01","date_gmt":"2016-01-13T12:16:01","guid":{"rendered":"http:\/\/blogs.sun.ac.za\/it\/?p=9180"},"modified":"2016-02-02T11:30:14","modified_gmt":"2016-02-02T09:30:14","slug":"phishing-e-mails","status":"publish","type":"post","link":"https:\/\/blogs.sun.ac.za\/it\/2016\/01\/phishing-e-mails\/","title":{"rendered":"[:en]Phishing remains prevalent[:af]Phishing steeds algemeen[:]"},"content":{"rendered":"<p>[:en]<\/p>\n<p>Attempts to harvest staff&#8217;s personal information in order to gain access to bank accounts, remains a thorny issue.<\/p>\n<p>Unfortunately we can&#8217;t warn you\u00a0against every potentially dangerous e-mail, but we can show you what to look for so you don&#8217;t fall prey to one of these scams. Look out for these signs:<\/p>\n<p>1. The e-mail is never addressed to you personally \u2013 it\u2019s a generic heading. (e.g. Dear client)<br \/> 2. It asks the receiver to divulge personal information, for example your ID number, password or username.<br \/> 3. The e-mail asks you to click on a link to &#8220;activate&#8221; your account. Don&#8217;t click on any links in e-mails (unless it&#8217;s an official IT e-mail) and also don&#8217;t copy and paste it in your web browser.<br \/> 4. Usually a short time limit is given, for example &#8220;within 24 hours&#8221;.<br \/> 5. Make sure the request is official and legal by calling the company and confirming.<br \/> 6. Do not send sensitive information by e-mail. Legitimate companies won&#8217;t ask you to send data by e-mail.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/Rs2Hk8dctDQ\" width=\"425\" height=\"350\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Above all, the best defence is being attentive and cautious. Report suspect email to <a href=\"mailto:sysadm@sun.ac.za\"><strong>sysadm@sun.ac.za<\/strong><\/a> and also read our articles on security on our <a href=\"http:\/\/blogs.sun.ac.za\/it\/category\/security-2\/\"> <strong>blog<\/strong><\/a>, as well as the fortnightly newsletter, <a href=\"http:\/\/blogs.sun.ac.za\/bb\"><strong>Bits &amp; Bytes<\/strong><\/a>.<\/p>\n<p>[:af]<\/p>\n<p>Pogings om personeel se persoonlike inligting te oes om toegang tot bankrekeninge te kry, bly `n netelige kwessie.<\/p>\n<p>Ongelukkig kan ons nie personeel waarsku teen elke e-pos bedreiging nie, maar ons kan uitwys waarna om te kyk sodat jy nie `n slagoffer word nie. Let spesifiek op die volgende:<\/p>\n<p>1. Die e-pos is nie persoonlik aan jou gerig nie, dis net `n generiese aanhef. (byvoorbeeld &#8220;Dear client&#8221;)<br \/> 2. Dit vra persoonlike inligting, byvoorbeeld jou ID-nommer, wagwoord of gebruikersnaam. <br \/> 3. Dit versoek dat jy op `n skakel kliek om jou rekening te &#8220;aktiveer&#8221;. Moenie kliek op skakels in e-posse nie (behalwe amptelike IT e-posse) en moet dit nie kopieer en plak in jou webblaaier nie. <br \/> 4. Daar is gewoonlik `n kort tydsbeperking gekoppel aan die versoek, byvoorbeeld &#8220;binne 24 uur&#8221;. <br \/> 5. Maak seker die versoeke is wettig deur die maatskappy se telefoonnommer te skakel en uit te vind.<br \/>6. Moenie sensitiewe informasie met e-pos stuur nie. Wettige maatskappye sal nie vra dat jy data per e-pos aan hulle stuur nie.<\/p>\n<p><iframe loading=\"lazy\" src=\"\/\/www.youtube.com\/embed\/Rs2Hk8dctDQ\" width=\"425\" height=\"350\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Bo en behalwe bogenoemde, is die beste veiligheidsmaatre\u00ebl oplettendheid en versigtigheid. Meld verdagte e-posse aan by <a href=\"mailto:sysadm@sun.ac.za\"><strong>sysadm@sun.ac.za<\/strong><\/a> en lees ook artikels oor sekuriteit op ons <a href=\"http:\/\/blogs.sun.ac.za\/it\/category\/security-2\/\"><strong>blog<\/strong><\/a>, sowel as die twee-weeklikse nuusbrief, <a href=\"http:\/\/blogs.sun.ac.za\/bb\"><strong>Bits &amp; Bytes<\/strong><\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p>[:]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[:en] Attempts to harvest staff&#8217;s personal information in order to gain access to bank accounts, remains a thorny issue. Unfortunately we can&#8217;t warn you\u00a0against every potentially dangerous e-mail, but we can show you what to look for so you don&#8217;t fall prey to one of these scams. Look out for these signs: 1. The e-mail [&hellip;]<\/p>\n","protected":false},"author":259,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[20382,29187],"tags":[20381],"class_list":["post-9180","post","type-post","status-publish","format-standard","hentry","category-email","category-security-2","tag-phishing"],"publishpress_future_action":{"enabled":false,"date":"2026-05-09 13:48:54","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9180","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/users\/259"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/comments?post=9180"}],"version-history":[{"count":28,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9180\/revisions"}],"predecessor-version":[{"id":9736,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/posts\/9180\/revisions\/9736"}],"wp:attachment":[{"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/media?parent=9180"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/categories?post=9180"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.sun.ac.za\/it\/wp-json\/wp\/v2\/tags?post=9180"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}