General

Do Pirates Use Email?: A Guide to Recognizing Phishing

Ahoy, matey! Ever feel like you’re sailing the high seas of the internet, only to find yourself caught in a net of deceit? Fear not, for this guide will help you spot those pesky phishing attempts before you end up walking the plank!

  • The Too-Good-to-Be-True Treasure — Imagine receiving an email claiming you’ve won a million dollars, a free vacation, or a lifetime supply of chocolate. Sounds like a dream, right? Well, if it sounds too good to be true, it probably is. Real treasures don’t come via unsolicited emails.
  • The Urgent SOS — Phishers love to create a sense of urgency. “Your account will be locked in 24 hours!” they scream. Before you panic and hand over your details, take a deep breath. Legitimate companies don’t threaten you with immediate doom.
  • The Fishy Email Address — Always check the sender’s email address. If it looks like it was generated by a cat walking on a keyboard (e.g., xj3k9@randomdomain.com), it’s probably not from your bank.
  • The Suspicious Links — Hover over links before clicking. If the URL looks like it leads to a sketchy site or is a jumble of random characters, steer clear. It’s like avoiding a dark alley in a pirate-infested town.
  • The Grammar Gaffes — Phishing emails often contain spelling mistakes and awkward grammar. If the email reads like it was written by a pirate after too much grog, it’s probably a scam.
  • The Personal Info Plunder — Legitimate companies will never ask for sensitive information like passwords or social security numbers via email. If they do, it’s a trap! Yarrgh!

Remember, matey, the best way to avoid getting hooked is to stay vigilant. When in doubt, throw that suspicious email overboard and report it to the Help Desk by mailing HelpDesk@huntington.edu. Happy sailing, and may your inbox be free of phishers!

 

Posted By: Bob Landon