Email threat to you and your curriculum network

Phishing email messages, websites, and phone calls are designed to steal money. Cyber-criminals can do this by installing malicious software on your computer or stealing personal information from your computer.

Cyber-criminals also use very clever tactics to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something from a website.

Unfortunately, there is an increased and ever-present threat to your curriculum network arising from malicious emails being sent to all business and personal email accounts. In response, we have reviewed what additional protection can be configured to protect you against this risk and have determined that a rule to block the download of certain file types (e.g. – *.exe, encrypted, * .zip files) is the best solution.

As your curriculum email is Cloud based, a rule has been configured on the Internet Web Filter.

But please remember that it is still very easy for a computer virus or malware to be present in an email whether the email is from an anonymous person, a friend or an official body such as a bank.

There may still be occasions when malicious emails arrive into your email Inbox.  Therefore, it is important that you remain wary of any email attachment that you weren’t expecting.

Please be aware that this advice applies to links to websites as well as links to Web downloads within emails.

Guidance

Please remember that an email can be spoofed very easily. Should you receive any suspicious E-mail, delete the email from both your Inbox and your Deleted Items folders.

Avoid opening or responding to spam or unsolicited E-mails as this will give the sender confirmation that they have reached a live address.

Be cautious about opening E-mail attachments generally, even if you know the sender, and never open an E-mail attachment that appears unusual or was not expected; contact the sender via another communication method to confirm the legitimacy of the email.

Never respond to E-mail requests for financial or personal information.

Do not click on E-mail links embedded in messages without checking the link . Please remember that you can hover over a link to see where the link will take you – if in any doubt, manually type the link into your preferred web browser rather than clicking on the embedded email link.