{"id":22394,"date":"2025-10-08T18:16:56","date_gmt":"2025-10-08T18:16:56","guid":{"rendered":"https:\/\/in.nau.edu\/its\/?page_id=22394"},"modified":"2025-10-08T21:03:38","modified_gmt":"2025-10-08T21:03:38","slug":"phishing","status":"publish","type":"page","link":"https:\/\/in.nau.edu\/its\/security\/ncsam-2025\/phishing\/","title":{"rendered":"Phishing"},"content":{"rendered":"<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-22303 aligncenter\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/envelope-hand-600x381.png\" alt=\"\" width=\"132\" height=\"84\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/envelope-hand-600x381.png 600w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/envelope-hand-300x191.png 300w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/envelope-hand.png 746w\" sizes=\"auto, (max-width: 132px) 100vw, 132px\" \/><\/p>\n<h4 style=\"text-align: center\">Recognize and report scams and phishing attempts<\/h4>\n<p style=\"text-align: center\">Be vigilant and learn to spot and report phishing attempts and scam emails.<\/p>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<h5 style=\"text-align: left\">What phishing is<\/h5>\n<p style=\"text-align: left\">Phishing is a method of cybercrime where criminals use email, text, social media, or other types of messaging services to trick a victim into clicking on harmful links or downloading malware. Phishing is a type of social engineering tactic, where instead of going after the technology itself, the attacker is going after the victim themselves.<\/p>\n<p>Falling victim to a phishing scam can put your personal information at risk, such as credit cards, social security numbers, banking information, and more.<\/p>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<div class=\"eplus-bg-color-row bg-color-extra-light-gray\"><div class=\"eplus-bg-color-row-content\">\n<p><span style=\"color: #525252\">\u24d8 At NAU, we&#8217;ll always continue to educate our community on how to spot and report phishing attempts so that not only your individual information, but also sensitive student, health, and financial data, remains secure.<\/span><\/p>\n<\/div><\/div>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<h5 style=\"text-align: left\">Common traits of phishing emails<\/h5>\n<ul>\n<li style=\"text-align: left\"><span style=\"color: #003366\"><strong>Incentives that seem too good to be true<\/strong><\/span>\n<ul>\n<li><span style=\"color: #6b6b6b\">Attackers will often promise incentives like money, giveaways, or job offers.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"color: #003366\"><strong>Urgency or threatening language<\/strong><\/span>\n<ul>\n<li><span style=\"color: #6b6b6b\">Used to make you panic, oftentimes referencing scenarios where you&#8217;re in legal trouble, or your accounts have been compromised, and you need to take action.<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"color: #003366\"><strong>Spontaneous requests for personal information<\/strong><\/span>\n<ul>\n<li><span style=\"color: #6b6b6b\">Legitimate organizations will never ask for sensitive information like passwords or account details over email or text.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"color: #003366\"><strong>Mismatched or mismatched sender addresses<\/strong><\/span>\n<ul>\n<li><span style=\"color: #6b6b6b\">Attackers may use similar-looking send addresses, like John@naucollege-edu.com<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"color: #003366\"><strong>Unfamiliar links or attachments<\/strong><\/span>\n<ul>\n<li><span style=\"color: #6b6b6b\">Always hover over a link with your mouse cursor when able to see where they lead. If they look suspicious, don&#8217;t click on them. Never download any attachments from a sender you don&#8217;t recognize.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<li><span style=\"color: #003366\"><strong>Poorly written content<\/strong><\/span>\n<ul>\n<li><span style=\"color: #6b6b6b\">Oftentimes, attackers will have grammar or spelling mistakes in their writing.\u00a0<\/span><\/li>\n<li><span style=\"color: #6b6b6b\">However, with the rise of generative Artificial Intelligence tools, many phishing emails may appear perfectly well written, so be sure to be extra cautious when verifying the validity of a message.\u00a0<\/span><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<h5>What to do if you think you&#8217;ve caught a phish<\/h5>\n<p>If you receive a suspicious email, don&#8217;t click on any links or take any action that the message is asking. Immediately report the message to ITS in one of the two ways.<\/p>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<ul>\n<li><span style=\"color: #003366\"><strong>Report the message directly in your email application with built-in tools<\/strong><\/span>\n<ul>\n<li>You can use built-in reporting features inside of Microsoft Outlook and Gmail to report the message. You can <a href=\"https:\/\/servicenow.nau.edu\/kb_view.do?sys_kb_id=fd4b6879c3310ad0f7eaf4fdd401318b\" target=\"_blank\" rel=\"noopener\">read our Knowledge Base article on how to report a phish directly in your email client.<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<ul>\n<li><strong><span style=\"color: #003366\">Forward the message to ITS<\/span><\/strong>\n<ul>\n<li>You can also report a phishing message to ITS by forwarding the message to <strong>phishing@nau.edu<\/strong>. Remember not to click on any links or interact with the message, just forward it.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<div class=\"eplus-bg-color-row bg-color-extra-light-gray\"><div class=\"eplus-bg-color-row-content\">\n<p><span style=\"color: #993300\">\u24d8 If you&#8217;ve fallen victim to a phishing email and clicked on any links or taken any action requested by the sender, immediately contact the ITS Service Desk.\u00a0<\/span><\/p>\n<\/div><\/div>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<p><a href=\"https:\/\/in.nau.edu\/its\/security\/ncsam-2025\">\u2039 Back to the 2025 Cybersecurity Awareness Month Overview<\/a><\/p>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-60px not-in-view\">\n<h3 style=\"text-align: center\">More of the Core Four<\/h3>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-30px not-in-view\">\n<div class=\"eplus-bg-color-row bg-color-extra-light-gray\"><div class=\"eplus-bg-color-row-content\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-22295 aligncenter\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/click-icon-529x600.png\" alt=\"\" width=\"70\" height=\"80\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/click-icon-529x600.png 529w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/click-icon-265x300.png 265w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/click-icon.png 674w\" sizes=\"auto, (max-width: 70px) 100vw, 70px\" \/><\/p>\n<h5 style=\"text-align: center\">Turn on multi-factor authentication when supported<\/h5>\n<p style=\"text-align: center\"><a href=\"https:\/\/in.nau.edu\/its\/security\/ncsam-2025\/mfa\" rel=\"noopener\">Read more about MFA \u203a<\/a><\/p>\n<\/div><\/div>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<div class=\"eplus-bg-color-row bg-color-extra-light-gray\"><div class=\"eplus-bg-color-row-content\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-22299 aligncenter\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/lock-icon-check-523x600.png\" alt=\"\" width=\"77\" height=\"88\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/lock-icon-check-523x600.png 523w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/lock-icon-check-262x300.png 262w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/lock-icon-check.png 642w\" sizes=\"auto, (max-width: 77px) 100vw, 77px\" \/><\/p>\n<h5 style=\"text-align: center\">Use strong passwords and a password manager<\/h5>\n<p style=\"text-align: center\"><a href=\"https:\/\/in.nau.edu\/its\/security\/ncsam-2025\/passwords\" rel=\"noopener\">Read more about passwords \u203a<\/a><\/p>\n<\/div><\/div>\n<hr role=\"separator\" class=\"hr--transparent hr--transparent-15px not-in-view\">\n<div class=\"eplus-bg-color-row bg-color-extra-light-gray\"><div class=\"eplus-bg-color-row-content\">\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-22311 aligncenter\" src=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/download-monitor-new-600x589.png\" alt=\"\" width=\"75\" height=\"73\" srcset=\"https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/download-monitor-new-600x589.png 600w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/download-monitor-new-300x294.png 300w, https:\/\/in.nau.edu\/wp-content\/uploads\/sites\/162\/2025\/10\/download-monitor-new.png 742w\" sizes=\"auto, (max-width: 75px) 100vw, 75px\" \/><\/p>\n<h5 style=\"text-align: center\">Keep your software and devices up-to-date<\/h5>\n<p style=\"text-align: center\"><a href=\"https:\/\/in.nau.edu\/its\/security\/ncsam-2025\/software-updates\">Read more about software updates \u203a<\/a><\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Recognize and report scams and phishing attempts Be vigilant and learn to spot and report phishing attempts and scam emails. What phishing is Phishing is a method of cybercrime where criminals use email, text, social media, or other types of messaging services to trick a victim into clicking on harmful links or downloading malware. Phishing [&hellip;]<\/p>\n","protected":false},"author":608,"featured_media":0,"parent":22286,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","ring_central_script_selection":"","footnotes":""},"class_list":["post-22394","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages\/22394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/users\/608"}],"replies":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/comments?post=22394"}],"version-history":[{"count":13,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages\/22394\/revisions"}],"predecessor-version":[{"id":22429,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages\/22394\/revisions\/22429"}],"up":[{"embeddable":true,"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/pages\/22286"}],"wp:attachment":[{"href":"https:\/\/in.nau.edu\/its\/wp-json\/wp\/v2\/media?parent=22394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}