Phishing Cyber Attacks

What is phishing?

Phishing is a type of cyber attack and form of social engineering which attempts to acquire sensitive information, such as usernames, passwords, and bank account details by pretending to be from a trusted person or part of a trusted group. Due to the seriousness of phishing, all Trinity employees are required to complete Cybersecurity Training.

How does it spread?

Usually through email. It often directs users to disclose private information at a fake website whose look and feel are almost identical to a legitimate one. It can also occur over the phone.

What does a phisher ask for?

Phishing will attempt to have you disclose private information for illegitimate purposes. This may include logging into your email, accessing confidential data, performing identity theft, or even withdrawing money from your bank account! These attacks commonly seek the following:

  • Your username & password
  • Your bank account or card number
  • Personally identifiable information, such as your date of birth, social security number or address
  • Confidential information (ie – student record or financial information)

How do I protect myself against phishing?

Here are simple techniques you can apply to protect yourself, our students, and Trinity from irreparable damage:

  • Don’t blindly trust e-mails you receive. Be suspicious and if necessary, call the other person and verify.
  • Is the sender or person calling someone you were expecting to hear from?
  • Is the attachment something you were expecting to receive?
  • Ask yourself whether you should be sharing the information requested.
  • Change your password regularly!
  • When in doubt, contact Technology Services.

All Trinity employees are required to complete Cybersecurity Training.

What do I do if I fell victim to a phishing attack?

If you have disclosed your login or other sensitive information at any time, change your password immediately and notify Technology Services.

Examples

Phishing attacks all share similarities. Using simple techniques, you can spot most of them. When in doubt, contact Technology Services.