What is Phishing?
Imagine receiving an email or text that seems totally legit - it might look like it's from your bank, a professor, or even a popular online service. But here's the catch: it's actually a sneaky cyberattack called 'phishing.' These hackers pretend to be someone trustworthy to trick you into revealing sensitive info like passwords or personal details. They're like digital con artists! So, be cautious when you get unexpected messages - don't take the bait!
Increase in Ransomware Attacks: In 2023, ransomware attacks on higher education institutions increased by 70%, with K-12 schools experiencing a 105% rise. This made 2023 the worst year on record for ransomware in the education sector.
Global Financial Losses: The cost of cybercrime is projected to reach $9.5 trillion in 2024 and exceed $10.5 trillion by 2025.
Key Elements of a Phishing Attack
- Deception: At LSSC, we've seen hackers often effectively impersonate your instructors, classmates, IT or promote new online games to trick you into revealing personal information or stealing your money.
- Urgency: Picture this: You're scrolling through your inbox, and suddenly,bam! An urgent email pops up. It claims your account is in trouble, or there's a limited time offer you can't miss. But hold up! 🛑 It might be a sneaky phishing attempt. These cyber tricksters want you to panic and act fast. So, take a breath, think twice, and don't let urgency cloud your judgment!
- Social Engineering: Phishers can manipulate your trust and curiosity by researching your social media to impersonate colleagues, friends, or family, crafting messages that seem legitimate and appeal to your interests or concerns.
- Links and Attachments: Phishing emails may contain links to fake websites that capture login credentials or financial information, and attachments that install malware on your system.
Safeguarding Against Phishing Threats
In our video: Swoop and Coop analyze a promising opportunity/email from a hacker. However, as they see, it's important to remember that if an opportunity seems too good to be true, it probably is. Hackers may promise high-paying, low-effort jobs to lure you in-but don't let them derail your goals and steal your dreams. Remember to:
- Exercise Caution: Carefully inspect all requests for sensitive information. Be wary of unexpected inquiries or those that press for immediate action.
- Verify the Source: Inspect the sender's contact details, such as email addresses or phone numbers, to confirm legitimacy. Protect again suspicious links by hovering over hyperlinks to reveal the true destination URL before you proceed to click.
- Enable Multi-Factor Authentication (MFA): Use MFA to add an extra layer of security to your accounts. This way, even if someone gets your password, they can't access your account without a second form of verification, like a code sent to your phone.