{"id":101700,"date":"2025-01-23T16:32:18","date_gmt":"2025-01-24T00:32:18","guid":{"rendered":"https:\/\/blogs.georgefox.edu\/ennounce\/?p=101700"},"modified":"2025-01-23T18:26:22","modified_gmt":"2025-01-24T02:26:22","slug":"information-from-it-about-recent-phishing","status":"publish","type":"post","link":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/","title":{"rendered":"Information from IT about recent phishing"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Thank you to all who made us aware of the most recent phishing campaign. For those unfamiliar with phishing, please see below for a quick refresher.\u00a0\u00a0<\/span><\/p>\n<p><b>What to Expect<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The phishing email may appear to be from a legitimate source or offer you something. However, it will attempt to trick you into revealing sensitive information or taking a specific action. Please note that logging into an unknown website or application will reveal your username and password to that website or application. This is one way your username and password can be stolen.<\/span><\/li>\n<\/ul>\n<p><b>How to Identify Phishing Emails<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Be cautious.<\/strong> Be wary of emails that:<\/span>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Create a sense of urgency or panic<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Request sensitive information<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Have spelling or grammar errors<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Contain suspicious links or attachments<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Offer something too good to be true (free stuff) or ask for money<\/span><\/li>\n<\/ul>\n<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Verify the sender.<\/strong> Check the sender&#8217;s email address to ensure it is legitimate. Look for mistakes in spelling or grammar, and be cautious of unfamiliar senders.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Don&#8217;t click.<\/strong> Never click on links or attachments from suspicious emails. Instead, contact the sender directly to verify their identity.<\/span><\/li>\n<li><b>Don\u2019t respond. <\/b>And don&#8217;t ever give an unknown person any money!<\/li>\n<\/ul>\n<p><b>What to Do<\/b><\/p>\n<ol>\n<li style=\"list-style-type: none;\">\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Mark as spam.<\/strong> If you receive a phishing email, mark it as spam immediately.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Report to IT.<\/strong> Forward the email to our IT department at servicedesk@georgefox.edu so we can investigate and block future messages.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><strong>Reach out<\/strong> to the sender through a different channel than how you were contacted, to ask about the legitimacy.<\/span><\/li>\n<\/ol>\n<\/li>\n<\/ol>\n<p><b>Your Cooperation<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Thank you for your cooperation. If you have any questions, email <\/span><a href=\"mailto:servicedesk@georgefox.edu\"><span style=\"font-weight: 400;\">servicedesk@georgefox.edu<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Thank you to all who made us aware of the most recent phishing campaign. For those unfamiliar with phishing, please see below for a quick refresher.\u00a0\u00a0 What to Expect The phishing email may appear to be from a legitimate source or offer you something. However, it will attempt to trick you into revealing sensitive information [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[38,23,29],"tags":[],"class_list":["post-101700","post","type-post","status-publish","format-standard","hentry","category-newberg-graduate-student","category-newberg-student","category-portland-student"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information from IT about recent phishing - The Daily Bruin<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information from IT about recent phishing - The Daily Bruin\" \/>\n<meta property=\"og:description\" content=\"Thank you to all who made us aware of the most recent phishing campaign. For those unfamiliar with phishing, please see below for a quick refresher.\u00a0\u00a0 What to Expect The phishing email may appear to be from a legitimate source or offer you something. However, it will attempt to trick you into revealing sensitive information [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"The Daily Bruin\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-24T00:32:18+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-24T02:26:22+00:00\" \/>\n<meta name=\"author\" content=\"sean\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sean\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/\",\"url\":\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/\",\"name\":\"Information from IT about recent phishing - The Daily Bruin\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#website\"},\"datePublished\":\"2025-01-24T00:32:18+00:00\",\"dateModified\":\"2025-01-24T02:26:22+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/bfdf65789b7634c1435d2fa683e2ace8\"},\"breadcrumb\":{\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blogs.georgefox.edu\/ennounce\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information from IT about recent phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#website\",\"url\":\"https:\/\/blogs.georgefox.edu\/ennounce\/\",\"name\":\"The Daily Bruin\",\"description\":\"What&#039;s going on at Fox\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.georgefox.edu\/ennounce\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/bfdf65789b7634c1435d2fa683e2ace8\",\"name\":\"sean\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/faae567a461b0650894894e46e38dd86d18d3a21d977b938cb4dfc028c2ec47f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/faae567a461b0650894894e46e38dd86d18d3a21d977b938cb4dfc028c2ec47f?s=96&d=mm&r=g\",\"caption\":\"sean\"},\"url\":\"https:\/\/blogs.georgefox.edu\/ennounce\/author\/sean\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information from IT about recent phishing - The Daily Bruin","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Information from IT about recent phishing - The Daily Bruin","og_description":"Thank you to all who made us aware of the most recent phishing campaign. For those unfamiliar with phishing, please see below for a quick refresher.\u00a0\u00a0 What to Expect The phishing email may appear to be from a legitimate source or offer you something. However, it will attempt to trick you into revealing sensitive information [&hellip;]","og_url":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/","og_site_name":"The Daily Bruin","article_published_time":"2025-01-24T00:32:18+00:00","article_modified_time":"2025-01-24T02:26:22+00:00","author":"sean","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sean","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/","url":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/","name":"Information from IT about recent phishing - The Daily Bruin","isPartOf":{"@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#website"},"datePublished":"2025-01-24T00:32:18+00:00","dateModified":"2025-01-24T02:26:22+00:00","author":{"@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/bfdf65789b7634c1435d2fa683e2ace8"},"breadcrumb":{"@id":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/01\/23\/information-from-it-about-recent-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.georgefox.edu\/ennounce\/"},{"@type":"ListItem","position":2,"name":"Information from IT about recent phishing"}]},{"@type":"WebSite","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#website","url":"https:\/\/blogs.georgefox.edu\/ennounce\/","name":"The Daily Bruin","description":"What&#039;s going on at Fox","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.georgefox.edu\/ennounce\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/bfdf65789b7634c1435d2fa683e2ace8","name":"sean","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/faae567a461b0650894894e46e38dd86d18d3a21d977b938cb4dfc028c2ec47f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/faae567a461b0650894894e46e38dd86d18d3a21d977b938cb4dfc028c2ec47f?s=96&d=mm&r=g","caption":"sean"},"url":"https:\/\/blogs.georgefox.edu\/ennounce\/author\/sean\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/posts\/101700","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/comments?post=101700"}],"version-history":[{"count":2,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/posts\/101700\/revisions"}],"predecessor-version":[{"id":101703,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/posts\/101700\/revisions\/101703"}],"wp:attachment":[{"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/media?parent=101700"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/categories?post=101700"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/tags?post=101700"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}