Information Technology

IT Support Assistant

Edit Template

Phishing Attacks

Phishing attacks, one of the most common online fraud methods, involve scammers sending emails to random user accounts. These emails appear to be sent from reputable websites, the user's bank, their employer, affiliates, or their email or internet service provider. The goal is to obtain and misuse personal or corporate information. The high rate of email usage, particularly due to the pandemic-related demands of remote work, has led to a proliferation of these types of scams. Links within emails play a significant role in deceiving users. We strongly advise our users to disregard suspicious messages from such dubious email accounts and avoid responding to requests such as "click the link below." We also urge them to perform the following checks and immediately report the situation to the IT Department.

BGO Phishing
  • Requests your personal or financial information,
  • It requests your username, password/password information,
  • Requests you to click on a link or download a file/software,
  • It may seem like it comes from a reliable/recognized institution you know, work with, or
  • It may appear to be coming from a friend, relative or co-worker.
  • It has minor differences visually and in terms of spelling rules from the page it copies, and it may adopt aggressive language as a communication language.
  • You should remember that no one will ever ask for your passwords. You should not share your passwords or their nature (eight characters, starts with my ID number, etc.) with anyone, either verbally or in writing.
  • Be wary of emails from acquaintances that contain an emergency, a sensitive topic, or a request for assistance; you should always contact the relevant person to verify the situation.
  • You should not click on links or download files/applications in suspicious emails.
  • You should check the sender's real name. Phishing emails often contain lowercase letters and extension differences.
  • You should not share your personal information without ensuring the authenticity of the email.
  • If an unknown number calls and requests personal information such as a password, credit card, etc., you should never share this information and report the number to the Information Security Office through the Solution Center. Remember that the attacker may pose as an employee or intern.
  • You should not use easily identifiable personal information (date of birth, place of birth, mother's name, etc.) in your passwords.
  • For your account security, you should use two-factor authentication on every platform possible.
  • You should keep the firewall and antivirus software on your devices up to date.
  •  
  • Check if the email comes from a trusted source, such as a reputable e-commerce site, your institution, financial institution, email provider, or internet service provider.
  • Never click on URL links in suspicious-looking emails, especially shortened ones (bit.ly, ow.ly, tinyurl.com, is.gd, goo.gl, tiny.cc, cli.gs, etc.). 
  • Be sure to check whether the web page you're directed to via the link is secure! Check that the address in your internet browser's address bar is "https://." The "s" at the end of "https://" indicates that this page is secure and uses various encryption methods. The closed padlock symbol in your internet browser's address bar also indicates that you're browsing on a secure and encrypted page.
  • If you are directed to a website via a link in an email, make sure the URL at the top of your browser matches the URL of the legitimate company you believe you are visiting. 
  • Are you being asked to provide personal information? Do not provide personal information to suspicious or unfamiliar websites.
  • Before filling out a form online, even on secure sites, check whether the site has a privacy agreement stating whether it shares this information with third parties.
  • Check your system regularly. Install security patches for your operating system and regularly update your antivirus software. Keep it up-to-date online.

When you receive an e-mail that you think is a phishing email, please do not waste any time so that we can take the necessary precautions.Solution Center > Information SecurityYou can send it to us via ”.

When you receive an e-mail that you think is for phishing purposes, do so immediately so that we can take the necessary precautions.Solution Center > Information SecurityYou can send it to us via ”.

Information Technology

© 2024 Created BY OZU INFORMATION TECHNOLOGY

Information Technology