{"id":106144,"date":"2025-12-04T16:13:43","date_gmt":"2025-12-05T00:13:43","guid":{"rendered":"https:\/\/blogs.georgefox.edu\/ennounce\/?p=106144"},"modified":"2025-12-04T16:36:41","modified_gmt":"2025-12-05T00:36:41","slug":"tis-the-season-email-safety-and-cybersecurity","status":"publish","type":"post","link":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/","title":{"rendered":"\u2019Tis the season: Email safety and cybersecurity"},"content":{"rendered":"<p><b>The holiday season represents one of the highest-risk periods of the year for cybersecurity, and new AI-generated attacks can be expected. <\/b><span style=\"font-weight: 400;\">With the increase in online shopping and package tracking, attackers are actively disguising malicious links as shipping notifications and invoices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your diligence remains our first and strongest line of defense. Taking a moment to verify a sender or an unusual request can prevent a major security incident for our community.<\/span><\/p>\n<p><b>Email Safety Do&#8217;s: Verify and Protect<\/b><\/p>\n<ul>\n<li><b>Do<\/b><span style=\"font-weight: 400;\"> hover your mouse over the sender&#8217;s name\/address to see the <\/span><b>full, actual email address<\/b><span style=\"font-weight: 400;\">. Watch for subtle misspellings (e.g. <\/span><span style=\"font-weight: 400;\">acme.co<\/span><span style=\"font-weight: 400;\"> instead of <\/span><span style=\"font-weight: 400;\">acme.com<\/span><span style=\"font-weight: 400;\">).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Do<\/b><span style=\"font-weight: 400;\"> inspect links <\/span><b>before<\/b><span style=\"font-weight: 400;\"> clicking. Hover your mouse over the link to see the destination URL displayed, usually in the corner of your browser. If it looks suspicious, don&#8217;t click.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Do<\/b><span style=\"font-weight: 400;\"> verify any unexpected or urgent requests for confidential data, password changes or fund transfers by using a <\/span><b>different method of communication<\/b><span style=\"font-weight: 400;\"> (e.g., call the sender on a known phone number or message them on an internal chat system).<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Do<\/b><span style=\"font-weight: 400;\"> treat any email requesting your password or sensitive personal\/company information with maximum suspicion.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Do<\/b><span style=\"font-weight: 400;\"> report all suspicious emails immediately by using the &#8220;Report Phishing&#8221; button in the three-dot stack menu within the email, or contact <a href=\"mailto:servicedesk@georgefox.edu\">servicedesk@georgefox.edu<\/a>.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Do<\/b><span style=\"font-weight: 400;\"> check the <\/span><b>time and tone<\/b><span style=\"font-weight: 400;\"> of the email. Is it demanding, overly urgent or coming at a strange hour? This is a common tactic used by scammers.<\/span><\/li>\n<\/ul>\n<p><b>Email Safety Don&#8217;ts: Avoid Risk and Reactivity<\/b><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Don&#8217;t<\/b><span style=\"font-weight: 400;\"> click on links or download attachments from senders you do not recognize or from emails that seem &#8220;off,&#8221; even if they appear to come from a known colleague.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Don&#8217;t<\/b><span style=\"font-weight: 400;\"> reply to an email asking for sensitive information like passwords, credit card numbers or internal account details.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Don&#8217;t<\/b><span style=\"font-weight: 400;\"> assume an email is legitimate just because it uses company logos or appears to come from an executive (CEO, CFO, etc.). This is known as &#8220;spoofing.&#8221;<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Don&#8217;t<\/b><span style=\"font-weight: 400;\"> be pressured by threats or urgency (e.g. &#8220;Your account will be suspended in five minutes!&#8221;). Scammers use fear to make you act without thinking.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Don&#8217;t<\/b><span style=\"font-weight: 400;\"> forward suspicious emails without first checking with <a href=\"mailto:servicedesk@georgefox.edu\">servicedesk@georgefox.edu<\/a>. We need to be able to investigate and take action.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Thank you for your partnership in keeping our community secure. Your vigilance makes all the difference.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The holiday season represents one of the highest-risk periods of the year for cybersecurity, and new AI-generated attacks can be expected. With the increase in online shopping and package tracking, attackers are actively disguising malicious links as shipping notifications and invoices. Your diligence remains our first and strongest line of defense. Taking a moment to [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32,38,23,30,29],"tags":[],"class_list":["post-106144","post","type-post","status-publish","format-standard","hentry","category-newberg-employee","category-newberg-graduate-student","category-newberg-student","category-portland-employee","category-portland-student"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u2019Tis the season: Email safety and cybersecurity - The Daily Bruin<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u2019Tis the season: Email safety and cybersecurity - The Daily Bruin\" \/>\n<meta property=\"og:description\" content=\"The holiday season represents one of the highest-risk periods of the year for cybersecurity, and new AI-generated attacks can be expected. With the increase in online shopping and package tracking, attackers are actively disguising malicious links as shipping notifications and invoices. Your diligence remains our first and strongest line of defense. Taking a moment to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"The Daily Bruin\" \/>\n<meta property=\"article:published_time\" content=\"2025-12-05T00:13:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-12-05T00:36:41+00:00\" \/>\n<meta name=\"author\" content=\"sean\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sean\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/\",\"url\":\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/\",\"name\":\"\u2019Tis the season: Email safety and cybersecurity - The Daily Bruin\",\"isPartOf\":{\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#website\"},\"datePublished\":\"2025-12-05T00:13:43+00:00\",\"dateModified\":\"2025-12-05T00:36:41+00:00\",\"author\":{\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/bfdf65789b7634c1435d2fa683e2ace8\"},\"breadcrumb\":{\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blogs.georgefox.edu\/ennounce\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u2019Tis the season: Email safety and cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#website\",\"url\":\"https:\/\/blogs.georgefox.edu\/ennounce\/\",\"name\":\"The Daily Bruin\",\"description\":\"What&#039;s going on at Fox\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blogs.georgefox.edu\/ennounce\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/bfdf65789b7634c1435d2fa683e2ace8\",\"name\":\"sean\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/faae567a461b0650894894e46e38dd86d18d3a21d977b938cb4dfc028c2ec47f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/faae567a461b0650894894e46e38dd86d18d3a21d977b938cb4dfc028c2ec47f?s=96&d=mm&r=g\",\"caption\":\"sean\"},\"url\":\"https:\/\/blogs.georgefox.edu\/ennounce\/author\/sean\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u2019Tis the season: Email safety and cybersecurity - The Daily Bruin","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"\u2019Tis the season: Email safety and cybersecurity - The Daily Bruin","og_description":"The holiday season represents one of the highest-risk periods of the year for cybersecurity, and new AI-generated attacks can be expected. With the increase in online shopping and package tracking, attackers are actively disguising malicious links as shipping notifications and invoices. Your diligence remains our first and strongest line of defense. Taking a moment to [&hellip;]","og_url":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/","og_site_name":"The Daily Bruin","article_published_time":"2025-12-05T00:13:43+00:00","article_modified_time":"2025-12-05T00:36:41+00:00","author":"sean","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sean","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/","url":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/","name":"\u2019Tis the season: Email safety and cybersecurity - The Daily Bruin","isPartOf":{"@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#website"},"datePublished":"2025-12-05T00:13:43+00:00","dateModified":"2025-12-05T00:36:41+00:00","author":{"@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/bfdf65789b7634c1435d2fa683e2ace8"},"breadcrumb":{"@id":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/2025\/12\/04\/tis-the-season-email-safety-and-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blogs.georgefox.edu\/ennounce\/"},{"@type":"ListItem","position":2,"name":"\u2019Tis the season: Email safety and cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#website","url":"https:\/\/blogs.georgefox.edu\/ennounce\/","name":"The Daily Bruin","description":"What&#039;s going on at Fox","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blogs.georgefox.edu\/ennounce\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/bfdf65789b7634c1435d2fa683e2ace8","name":"sean","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blogs.georgefox.edu\/ennounce\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/faae567a461b0650894894e46e38dd86d18d3a21d977b938cb4dfc028c2ec47f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/faae567a461b0650894894e46e38dd86d18d3a21d977b938cb4dfc028c2ec47f?s=96&d=mm&r=g","caption":"sean"},"url":"https:\/\/blogs.georgefox.edu\/ennounce\/author\/sean\/"}]}},"_links":{"self":[{"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/posts\/106144","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/comments?post=106144"}],"version-history":[{"count":7,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/posts\/106144\/revisions"}],"predecessor-version":[{"id":106163,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/posts\/106144\/revisions\/106163"}],"wp:attachment":[{"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/media?parent=106144"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/categories?post=106144"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.georgefox.edu\/ennounce\/wp-json\/wp\/v2\/tags?post=106144"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}