Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Phishing»What Is Phishing And How Can We Prevent it?
    Phishing

    What Is Phishing And How Can We Prevent it?

    By Marc HerzogSeptember 14, 20233 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    Due to a rise in targeted scams against the University community, the Information Security and Assurance team would like to share some information to safeguard your account and information.

    A phishing scam is one where an authentic-looking email or text message is sent to you attempting to gain access to your PII (personal identifiable information) or your Fordham accounts. They consist of several parts:

    How Do Phishing Campaigns Work?

    1. A scammer guesses or gains access to your password through social engineering or malicious links.
    2. They then send you a DUO prompt (text, call, etc.) after attempting to log into your account.
    3. You provide the DUO approval, believing it to be legitimate.
    4. The scammer then accesses your email to send out thousands of similar scam/phishing messages to other Fordham students/faculty. These messages can contain fraudulent job postings or research opportunities.
    5. The emails attackers will send out from your account will often include a link to a Google form or non Fordham sanctioned medium to request information from others such as…
      • Full name
      • Home address
      • Phone #
      • Social Security #
      • Bank account information
      • Pets names, or other information about yourself that seem benign but can be used to gain access to other accounts.

    What Happens Once You Start Corresponding With a Scammer?

    Once someone falls for a scam, the attacker may ask the student to cash a check and send them money back as part of the student’s job responsibilities.

    However, the check the scammers send victims is fake. Once the check bounces, funds are still withdrawn from the victim’s account, leaving them responsible for the money sent to the scammer.

    These scams require several steps to work, but even partial success results in mass disruption to the University community and its individual members.

    How To Avoid Falling For Phishing Scams

    • Make Your Passwords Hard To Guess.
      • Avoid using pets names, family names, addresses, nicknames, birthdates.
      • The longer the password is, the harder it is to crack.
      • Use phrases instead of words. 
      • Use numbers and symbols as substitutes for letters. For example: F0rdh@mR@m$ instead of FordhamRams.
    • Do Not Share Your Passwords With Anyone Else.
    • Do Not Reuse Passwords.
      • Keep a password manager to store your passwords securely and avoid reusing passwords.
    • If You Didn’t Login Into Your Fordham Account, Don’t Accept Any DUO Notifications.
      • Do not Click the green check box
      • If you receive a call from duo mobile asking you to authenticate, Press 1.
      • Do not Give the texted code to anyone.

    These are safeguards to ensure YOU are the person who is accessing private applications. If you are not the person requesting DUO authentication, then someone else is.  Don’t give them access!

    • If you Receive and Email With A Link And Am Unsure Of Its Legitimacy, Do Not Click On It.
    • If You Believe An Email Is Phishy- Report It!
      • There is a reporting method built into our GMail solution, called Cofense Reporter
      • Information Security & Assurance will respond to your report within 2 business days.
    • Do Not Fill Out Forms From People You Don’t Know
    • Do Not Cash Checks From People You Don’t Know
      • If the check is written on an overdrawn or closed account, you will be held accountable for the funds and any fees the bank charges.

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Phishing Email Security Awareness
    Previous ArticleMalware Camping and Tagging Call of Duty Players
    Next Article How AI Can Help and Hurt Cybersecurity

    Related Posts

    10 Critical Network Pentest Findings IT Teams Overlook

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d