What are the four guidelines for employees to follow to prevent phishing attacks?

What will be an ideal response?


Check the browser address bar and footer. If a Web site does not have an HTTPS
address or a lock icon, it is not a secure site, and no personal information should be
entered. Also, the lock icon can be faked, so users should not believe that its presence
indicates a secure site.

If you get an e-mail from a company you are familiar with, call the company to confirm
that the request is legitimate. Companies usually have an 800 number for this purpose.

Forward any obvious phishing e-mails to the company being portrayed in the phishing
attempt. PayPal and eBay, for example, have forwarding addresses set up for this purpose.

Delete any unsolicited e-mails about foreign banking.

Computer Science & Information Technology

You might also like to view...

A(n) ________ document formats the document so that recipients can view it but not make changes to it

Fill in the blank(s) with correct word

Computer Science & Information Technology

Which of the following is not a common problem with antivirus protections?

A. Users may turn the AV off. B. Automatic updates of virus signatures might be inadvertently turned off. C. Users may turn the AV off, the virus program contract may expire, and automatic updates of virus signatures might be inadvertently turned off. D. The virus program contract may expire

Computer Science & Information Technology

The su command enables a user to switch to the root user account, while the sudo command enables users to issue individual commands as root.

a. True b. False

Computer Science & Information Technology

The ____ shows a thumbnail for each slide in the presentation file.

A. Slides tab B. Outline tab C. Slide pane D. Notes pane

Computer Science & Information Technology