Passwords, Email Phishing and Searching
Secure Passwords
Create secure passwords - TIPS
Avoid using common names in passwords such as your child's name or pet
Do not leave passwords in common places; i.e. sticky notes on desks/computers
Do not share passwords/accounts with others
Have different passwords for different groups of accounts based on the type of information in those accounts; i.e. one or more for bank accounts, one for social media, one for work email, etc.
Change passwords on a frequent basis
Do not leave accounts logged in that may contain protected information
Practice Safe Internet Searching and E-mailing
Going to websites for "free" downloads and pirate sites (which are also illegal) can compromise your computer or attempt to coerce you into giving up personal information.
Be aware of how to read an internet address (URL)
If you have followed a link to site that claims it is a legitimate business, do a completely separate search for the same business and compare the website address. It may alert you that you could be on a fraudulent site. Follow the old saying, if it is too good to be true, it probably is.
Be aware of what type of information it is asking you for and should you be providing it
If you have any doubts about an email or an attachment, contact the tech dept. before opening it. SPAM filters do well, but are not able to catch it all. Phishing is a common attempt to gain access to data and personal information.
Hover over links to see the actual email address from which the email was sent to help determine if you really think it is coming from the person it claims to be. Remember, an email may look like it is coming from someone you know, when in reality, the sender has already compromised the account of the person you know, and obtained access to all of their contacts allowing them to portray they are that person
Does the email have a link or document that they want you to open which may be malicious and can infect your computer or prompt you for bank account information, passwords, etc.
Pay attention to awkward sentence construction, formatting and surprising spelling errors that may be a red flag
Search the internet yourself to see if other people have already complained or commented about the same issue you are suspicious of
Tips for avoiding social engineering and phishing attempts - protecting your data and identity