{"id":328,"date":"2016-10-11T10:33:35","date_gmt":"2016-10-11T14:33:35","guid":{"rendered":"http:\/\/blog.uvm.edu\/whysecurity\/?p=328"},"modified":"2016-10-11T10:33:35","modified_gmt":"2016-10-11T14:33:35","slug":"email-take-it-or-leave-it","status":"publish","type":"post","link":"https:\/\/blog.uvm.edu\/whysecurity\/2016\/10\/11\/email-take-it-or-leave-it\/","title":{"rendered":"Email \u2013 take it or leave it?"},"content":{"rendered":"<p>October is National Cyber Security Awareness Month. This is the first of four timely tips based on current hot topics at the university.<\/p>\n<p><span style=\"text-decoration: underline\">Email \u2013 take it or leave it?<\/span><br \/>\nEmail is a useful tool for communication but is also the most popular way that problems can be easily brought into our University Community. Some quick tips to protect yourself, your data, and\u00a0your reputation as well as that of the University are:<\/p>\n<ul>\n<li>Be suspicious \u2013 Does it sound too good to be true? It is. Does it feel like you are being excessively pressured? You are. Does it sound weird, look weird, have grammar or spelling mistakes? It\u2019s a fake.<\/li>\n<li>Think About the Link \u2013 email links that go to strange places are the quickest way to get someone to go to an illegitimate site and mistakenly enter their credentials. Hover over the link (but don\u2019t click) and see if it really goes to a uvm.edu site. Many times they don\u2019t and should be reported as phish.<\/li>\n<li>Attachments \u2013 were you expecting that email with a document from that person? Lots of bad software can come into our community through attachments. Your best bet is to not open or forward an attachment that you were not expecting.<\/li>\n<li>Report it \u2013 think you just received a phish or scam? Report it by sending the message as an attachment to abuse@uvm.edu<\/li>\n<li>Call \u2013 if you can\u2019t tell whether a message is real or not, go for the low tech solution and call the sender by independently finding their phone number via their official website (don\u2019t use the one that was sent in the email message!)<\/li>\n<\/ul>\n<p>Hopefully tips like these will help you stay safe at home or work!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>October is National Cyber Security Awareness Month. This is the first of four timely tips based on current hot topics at the university. Email \u2013 take it or leave it? Email is a useful tool for communication but is also the most popular way that problems can be easily brought into our University Community. Some &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blog.uvm.edu\/whysecurity\/2016\/10\/11\/email-take-it-or-leave-it\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Email \u2013 take it or leave it?&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1447,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-328","post","type-post","status-publish","format-standard","hentry","category-uncategorized","entry"],"featured_image_src":null,"featured_image_src_square":null,"author_info":{"display_name":"dpientka","author_link":"https:\/\/blog.uvm.edu\/whysecurity\/author\/dpientka\/"},"_links":{"self":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/328","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/users\/1447"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/comments?post=328"}],"version-history":[{"count":4,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/328\/revisions"}],"predecessor-version":[{"id":344,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/posts\/328\/revisions\/344"}],"wp:attachment":[{"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/media?parent=328"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/categories?post=328"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.uvm.edu\/whysecurity\/wp-json\/wp\/v2\/tags?post=328"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}