Viewable by the world
|
|
...
- Click here to fill out the form: https://docs.google.com/a/lbl.gov/forms/d/1CyLC5yKCgwz9bvUOGLrC37zOJ0Vi0Y1EjnU01no5CCE/viewform
What is Phishing?
An important part of this campaign is distinguishing between what is a phishing email, a targeted phishing email, and spam.
...
Attack | Description | Action you should take | ||||||||
---|---|---|---|---|---|---|---|---|---|---|
Phish | These are attacks that are carried out in order to steal usernames, passwords, credit card information, Social Security Numbers, and other sensitive data by masquerading as a trustworthy entity. Most often the emails pretend to be from credible sources such as, financial organizations or online services. These messages often ask you to click on a link, send information via email or fax, or enter credentials into a seemingly legitimate website. | Forward to Inform [email protected] (see next section) | ||||||||
Targeted Phishing | These are attacks that are in the context of your affiliation with Berkeley Lab, UCB, UC, or DOE to steal sensitive data (i.e. usernames, passwords, SSNs). These messages could use names of co-workers, appear to come from LBL email addresses, or directly reference Berkeley Lab employees. These can be very difficult to distinguish from legitimate messages and are important to notify the Cyber Security team about quickly. | Forward to Inform [email protected] (see next section) | ||||||||
Spam | These are unwanted messages but are not asking for sensitive information. | Use
|
- For more information on phishing see the Cyber Security Resources page on Spam, Phishing, Targetted Phishing
...
The tool we are using to send and track simulated phishing emails comes has with a Chrome extention called the Phishme Reporter.
This extention extension adds a button in Gmail
https://chrome.google.com/webstore/detail/phishme-reporter/dgbbjjedalfdhoeamabpnnepfjaegmop
...