Computeruser.com
Latest News

Phishing Threats: What to Watch Out For

BOULDER, Colo. Jan. 27, 2011

phishing protection

What is Phishing—and What is Legitimate?

what is phishing

Even if you receive an email with a link to a company’s site, don’t click on it. The link may take you to a false site that looks and responds like the real thing. Instead, enter the company’s URL manually (the same one you use to manage your accounts). This will ensure you’re at the legitimate site.

[email protected]

Additional Phishing Protection and Tips

phishing protection

Even with phishing protection and security software, it’s important to be vigilant. To protect yourself further, keep these tips in mind:

  • Do not provide personal information to unsolicited requests for information
  • Only provide personal information on sites that have "https" in the web address or have a lock icon at bottom of the browser
  • Continually check the accuracy of personal accounts and immediately deal with any discrepancies
  • Do not open messages from unknown senders—and always delete messages you suspect are spam

Finally, use varied and complex passwords for all of your accounts. This will help mitigate the damage that can be done even if cyber criminals are able to get one or two of your passwords.

MacLean Guthrie

1-720-842-3164

[email protected]

SOURCE Webroot

Leave a comment

seks shop - izolasyon
basic theory test book basic theory test