username:
password:
* * * * *
* * * * *
ALTHOUGH BRADKEN’S IT SYSTEMS ARE
GUARDED AGAINST VIRUSES, THERE
ARE MANY INDIVIDUALS AND GROUPS
(SCAMMERS) WHO CONSTANTLY
TRY TO GATHER COMPANY OR
PERSONAL INFORMATION BY SENDING
FRAUDULENT EMAILS.
With a recent increase in the number
of fake emails received through
company email accounts that appear
to be sent by Telecommunication
Companies, Couriers, Government
sites (Tax office etc.) and Financial
Institutions, it is important to be
aware of what to look out for and
how to guard against such actions.
RANSOMWARE
Ransomware is a type of software
which restricts access to its victim’s
computer system, and demands a
‘ransom’ be paid to the perpetrator
in order for the restriction to be
removed. Typically ramsonware
enters a computer system through
the download of an executable file
(filename.exe) that when opened,
encrypts all of the files on the computer.
PHISHING
Phishing
(pronounced
‘fishing’)
scammers fish for confidential
information (passwords, usernames,
bank account details, PIN numbers,
etc.) by sending fakeemails that appear
to be from trustworthy organisations
and asking for confidential information
to be entered on bogus websites or by
returning fake emails. Common ploys
include "Click on the link to verify your
account" or "You have won one million
dollars! Click here to claim your prize." 
EMAIL SECURITY
Email is not a secure form of
communication as messages can be
intercepted in transit. Avoid sending
any sensitive information over email,
and if you must, encrypt the email
before sending.
VIRUSES
Emailedattachmentscancomebundled
with viruses and downloading them
can infect your computer. Only open
attachments if you trust the source.
SPAM
Unsolicited bulk email messages
can fill up your mailbox and become
extremely frustrating. If you receive
spam delete it, don’t open it or
click "unsubscribe" as this will alert
spammers that your email address
is active.
GONE
PHISHING
TOP TIPS:
1. Never open an executable file sent
via email
2. Never click on a link contained in
an email
3. Avoid sending sensitive information
over email
4. Only download email attachments
from trustworthy sources
5. Even if you are confident a website
is legitimate,
test it
- enter fake
information into the form before
providing your genuine credentials
- a phishing site will accept the
false information, but the real site
will give you an error
6. Pay attention to your browser if it
warns you that a website may be
forged
GLOBALEYES / EDITION 14
13
INFORMATION TECHNOLOGY
1...,3,4,5,6,7,8,9,10,11,12 14,15,16,17,18,19,20,21,22,23,...24