SEC-GDL-005-Anatomy of a Phishing
|
|
|
- Alan Dorsey
- 10 years ago
- Views:
Transcription
1 Technology & Information Services SEC-GDL-005-Anatomy of a Phishing Author: Paul Ferrier Date: 07/11/2014 Document Security Level: Document Version: PUBLIC 0.98 Document Ref: SEC-GDL-005 Document Link: GDL-005-Anatomy%20of%20a%20Phishing%20 .pdf Review Date: 11/2015
2 Introduction Your University computer account enables you to access a wealth of software and electronic resources. These resources must be protected from unauthorised use, otherwise the University may lose the ability to access them. Additionally, your account provides access to sensitive personal information held within the Student Records or Human Resource systems. Your account is also necessary in order to carry out your daily work. Never disclose your password. 1. Definitions Phishing Spam Spear Phishing Spoofing Whaling is fraud method in which the perpetrator sends out legitimate-looking in an attempt to gather personal and/or financial information from recipients. Irrelevant or unsolicited messages sent over the internet, typically to large amount of users, for the purpose of advertising, phishing or spreading malware etc. is aimed specifically at users with an important status at an organisation. They are targeted s that have combined publically available information from social media sites (LinkedIn, Facebook etc.) to provide a more personal phishing . The result is still the same; the attacker is trying to gain access to a personal account in order to harvest and use data. is the ability for one person or a programme to masquerade as another by falsifying data. is a term where a specific spear phishing campaign is launched against a user who is likely to have highly privileged access to corporate or sensitive information within an organisation. 2. Purpose of Phishing s 2.1 Phishing s just fill up your inbox, they are often crafted to get end users to either respond with information the perpetrator requires, or to click an embedded link and be taken to another location to provide account details. 2.2 Once account details, usually username and password, are provided this account is at risk of compromise either immediately, to allow additional phishing attacks to take place or to store your details for future use. 2.3 A successful phishing attack has implications both for you and the University network as a whole. It not only compromises your account but is a security risk and can result in University mail servers being blacklisted by other organisations and therefore prevent legitimate communications being sent or received. 3. How to identify a Phishing 3.1 Most phishing attacks contain consistent themes, but they are often subtly different. There are almost always clues that should help differentiate authentic s from bogus ones. 3.2 A simple checklist is below: Subject line Language within the body of the message Senders address Recipient address Location of embedded links Requests for sensitive information (username and password) Inconsistencies with terminology Directs you to login to a non-official service with your credentials Page 2 of 8
3 3.3 The Simple Phish This is the entire content of the . Looking closely though you should be able to easily identify it as a phishing by the highlighted points: From address (1) do you know the user, or do you use the domain mesquiteisd.org? The recipients (2) have been hidden, but the sender has copied themselves into the . While this is a legitimate practice often used for distributing s to large amounts of end users (for example, a Postmaster or News Alert internal , refer to section 6 for details of such accounts). There is an embedded link (3) provided hovering over this with a mouse will show the destination of the link. The link itself may redirect you somewhere other than its stated location, this indicates nefarious activity is attempted to be disguised. The overriding factor here is that there is no information in the . As such, this would likely be a smash and grab attempt to get a small percentage of a large number of user credentials which the is sent to. 3.4 The Standard Phish In comparison to 3.3 this provides slightly more content to examine. Subject matter (1) if your mailbox is full, you may not be able to receive s. Incorrect English (2), will expires, typos do occur in s but there is very little punctuation and there is a conflict between the subject line your mailbox is full and you password will expire. Embedded link (3), hovering over this with a mouse will show the destination of the link. The hyperlink (4) would take you to a bravesites.com sub-domain this is in no way associated with Plymouth University. In addition, the link itself may redirect you somewhere other than its stated location, this indicates nefarious activity is attempted to be disguised. University s would not be sent from System Administrator (5). The signature (6) is not consistent with the University s branding style. Overall there is no coherent or consistent content throughout the , and there are enough indicators to identify it as a phishing . Page 3 of 8
4 3.5 The Comprehensive Phish There is more content than the previous examples to work with, which may make it more challenging to identify it as bogus. However, closer inspection will afford similar details to previous examples though: The University mail servers (1) have already identified the content of the message to be potentially a counterfeit by adding ***SPAM*** to the subject line. Do you know or have you had recent contact by the originating author (2) of the ? Even if you have, this type of may suggest that their account has not been hijacked by a third party for malicious means or that the sender has not been spoofed. There is an embedded link (3) within the message body and it provides the actual URL that clicking it will redirect you to. Still check the end location by rolling over the link with your mouse, it may be saying one thing and will send you to another location. The University does not refer to its resources as a Faculty and Staff Portal (4); the perpetrator is trying to cover as many bases to entice as many users as possible to click the link. Although it doesn t always happen, central communications should not refer to technical terminology (5) or use abbreviations without explaining what it means for all users to understand. Central communications would not refer to copyright (6) for an , as when the item leaves the senders inbox they relinquish control of the message, as it can be forwarded without consent for example. Page 4 of 8
5 3.6 The Full Phish The recipients details have been removed, so that the example can fit on the page. So there is a lot of information here, in fact there is too much information: Technical terminology (1) or abbreviations without explaining what they mean. Page 5 of 8
6 Inconsistent naming of department (2) and the service, also copyright notice. Embedded link (3) within the message body that provides the actual URL that clicking will redirect you to. Still check the end location by rolling over the link with your mouse, it may be saying one thing and will send you to another location. Information that may be accurate (4), is added to try and prove the message is more authentic or potentially too long in the hopes that the target user will not read it all and just click the provided link instead. Figures that back up the additional information (5), there is no need for an end user to be presented with this data. It once more is designed to confuse the recipient of the into thinking that it is genuine. Finally, it appears as in this case that some creators of phishing attacks are copying information from the University web pages (6) and placing that information into the body of an . The important point to consider is does this content fit with the remainder of the body of the ? The example on the previous page suggests not. Why would talking about Open Access facilities be required when the remainder of the talks about mailbox quotas. 3.7 The Service Phish This is the quick and easy route to scare users into providing details. Hover over the vaildate link (1) will show you the location you will be taken to. Any new or significantly altered services will be communicated well in advance (2), consider the advertising surrounding the new website or the digital learning environment, for example. The University does not have a (3) message center (Americanised spelling). Legitimate s are not issued from the University (4) Help Desk, please refer to section What to do with Phishing s 4.1 If you a sure that the message is a phishing , just delete it. If you are unsure about the validity of an ask (see point 4.6). 4.2 It can take up to two full working days (sometimes longer) to resolve problems if a compromised account has been used to start sending further phishing s. 4.3 Do not click on any links. Depending on the code within the target web page, the address or other tracking information may be passed across and denote that you are susceptible to these type of messages. 4.4 Do not reply to the message. It will denote that your address is live and could be used once more. Page 6 of 8
7 4.5 A simple search of the subject line through a web browser may illicit an immediate answer to whether it is a hoax or not. See the second result in the listing over the page. 4.6 You can also check the Strategy and Architecture Blog Site s Phishing Line ( where known about phishing s received by the Service Desk are published. 4.7 Forward the to the Service Desk ([email protected]) for investigation, or telephone them on and then delete the from your Inbox. 5. What to do if you have responded to a Phishing 5.1 Change your account password immediately, this will potentially be posted on the Internet in the public domain associated to your address or username. This password should not be used again for this account. 5.2 Contact the Service Desk ([email protected]) (as point 4.6) for investigation. 5.3 Depending on the progress of any subsequent actions undertaken with your account, TIS may be required to provide you with a new address from which to send s. You will retain your old address for receiving legitimate content. 6. Valid Central Communication Addresses 6.1 Please find below a list of valid central addresses that the University use to staff and or students: Service Desk Postmaster News Alert [email protected] [email protected] [email protected] Page 7 of 8
8 Document Control Version Author Position Details Date/Time Approved 0.9 Paul Ferrier Enterprise Security Architect 0.91 Michael Paraseava 0.93 PF, Nick Sharratt, Emma Wainman TIS Communications Officer ESA, BP and DPO Created the document Communications advice Final comments before wider distribution 0.94 PF ESA Updated document with new template 0.95 PF ESA Following recent phishing campaign 0.96 PF ESA Following comments from Service Management 0.97 PF ESA Final comments from Service Management 0.98 PF ESA Reclassified document and added link to Phishing Line on the Blog Site Position Date/Time by 23/08/2014 n/a n/a n/a 04/09/2014 n/a n/a n/a 08/10/2014 n/a n/a n/a 07/11/2014 tbc tbc tbc 02/12/ /12/ :15 09/12/ :30 29/01/ :30 Page 8 of 8
Information Security Field Guide to Identifying Phishing and Scams
Information Security Field Guide to Identifying Phishing and Scams 010001010100101010001010011010101010101010101 01000101010011010010100101001010 1 Contents Introduction Phishing Spear Phishing Scams Reporting
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000
DEPARTMENT OF DEFENSE 6000 DEFENSE PENTAGON WASHINGTON, D.C. 20301-6000 CHIEF INFORMATION OFFICER October 1, 2015 MEMORANDUM FOR SECRETARIES OF THE MILITARY DEPARTMENTS CHAIRMAN OF THE JOINT CHIEFS OF
ModusMail Software Instructions.
ModusMail Software Instructions. Table of Contents Basic Quarantine Report Information. 2 Starting A WebMail Session. 3 WebMail Interface. 4 WebMail Setting overview (See Settings Interface).. 5 Account
DON T BE FOOLED BY EMAIL SPAM FREE GUIDE. Provided by: Don t Be Fooled by Spam E-Mail FREE GUIDE. December 2014 Oliver James Enterprise
Provided by: December 2014 Oliver James Enterprise DON T BE FOOLED BY EMAIL SPAM FREE GUIDE 1 This guide will teach you: How to spot fraudulent and spam e-mails How spammers obtain your email address How
Cloud Services. Email Anti-Spam. Admin Guide
Cloud Services Email Anti-Spam Admin Guide 10/23/2014 CONTENTS Introduction to Anti- Spam... 4 About Anti- Spam... 4 Locating the Anti- Spam Pages in the Portal... 5 Anti- Spam Best Practice Settings...
WHITEPAPER. V12 Group www.v12groupinc.com 141 West Front Street, Suite 410 Red Bank, NJ 07701 [email protected] 1.866.842.1001
WHITEPAPER Phishing Facts for Email Marketers: Understanding the phishing factor impact on your email programs. Email phishing attacks are destructive for everyone, it s not just the brands (and their
How to Identify Phishing E-Mails
How to Identify Phishing E-Mails How to recognize fraudulent emails and avoid being phished. Presented by : Miguel Fra, Falcon IT Services ([email protected]) http://www.falconitservices.com
USING OUTLOOK WEB ACCESS
USING OUTLOOK WEB ACCESS 17 March 2009, Version 1.0 WHAT IS OUTLOOK WEB ACCESS? Outlook Web Access (OWA) is a webmail service of Microsoft Exchange Server. The web interface of Outlook Web Access resembles
Login Instructions. 1. Type web URL https://www.getrave.com/login/wmichmed into your browser s address bar.
Rave Alert System WMed has partnered with Rave Mobile Safety to provide an emergency alert system to inform you of emergency situations, closures, and other important notifications. The system allows for
User manual VU-Mail Webmail Outlook Web App februari 2010
VU University Amsterdam University Centre IT User manual VU-Mail Webmail Outlook Web App februari 2010 This document describes how to access and configure VU Webmail (Outlook Web App). 1. Index 1. Index
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Phishing Scams Security Update Best Practices for General User
Phishing Scams Security Update Best Practices for General User hishing refers to the malicious attack Pmethod by attackers who imitate legitimate companies in sending emails in order to entice people to
OCT Training & Technology Solutions [email protected] (718) 997-4875
OCT Training & Technology Solutions [email protected] (718) 997-4875 Understanding Information Security Information Security Information security refers to safeguarding information from misuse and theft,
Malware & Botnets. Botnets
- 2 - Malware & Botnets The Internet is a powerful and useful tool, but in the same way that you shouldn t drive without buckling your seat belt or ride a bike without a helmet, you shouldn t venture online
Advice about online security
Advice about online security May 2013 Contents Report a suspicious email or website... 3 Security advice... 5 Genuine DWP contacts... 8 Recognising and reporting phishing and bogus emails... 9 How DWP
Basic Security Considerations for Email and Web Browsing
Basic Security Considerations for Email and Web Browsing There has been a significant increase in spear phishing and other such social engineering attacks via email in the last quarter of 2015, with notable
Sending Email on Blue Hornet
Sending Email on Blue Hornet STEP 1 Gathering Your Data A. For existing data from Advance or Outlook, pull email address, first name, last name, and any other variable data you would like to use in the
Adjust Webmail Spam Settings
Adjust Webmail Spam Settings An unsolicited bulk email message is known as "spam." Spam, which usually contains some sort of commercial advertising or proposition, is sent to a large number of recipients
Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education
White Paper Using Email Security to Protect Against Phishing, Spam, and Targeted Attacks: Combining Features for Higher Education Online criminals are constantly looking for new ways to reach their targets
How to stay safe online
How to stay safe online Everyone knows about computer viruses...or at least they think they do. Nearly 30 years ago, the first computer virus was written and since then, millions of viruses and other malware
Recognizing Spam. IT Computer Technical Support Newsletter
IT Computer Technical Support Newsletter March 23, 2015 Vol.1, No.22 Recognizing Spam Spam messages are messages that are unwanted. If you have received an e-mail from the Internal Revenue Service or the
Don t Fall Victim to Cybercrime:
Don t Fall Victim to Cybercrime: Best Practices to Safeguard Your Business Agenda Cybercrime Overview Corporate Account Takeover Computer Hacking, Phishing, Malware Breach Statistics Internet Security
STUDENT WEBMAIL. User Guide. Realise Your Potential
STUDENT WEBMAIL User Guide Realise Your Potential Email acceptable usage policy & safety tips Email is a wonderful tool for sending and receiving information quickly and securely to tutors, teachers or
Top 40 Email Marketing Terms You Should Know
1601 Trapelo Road Phone 781-472-8100 Suite 246 Fax 781-472-8101 Waltham, MA 02451 www.constantcontact.com Top 40 Email Marketing Terms You Should Know If you have ever felt out of your depth in a discussion
Fraud Trends. HSBCnet Online Security Controls PUBLIC
Fraud Trends HSBCnet Online Security Controls العربیة 文 En français En Español 繁 體 中 文 简 体 中 Contents Types of Fraud Malware Attacks Business E-mail Compromise Voice Phishing ( Vishing ) Short Message
AppShore Premium Edition Campaigns How to Guide. Release 2.1
AppShore Premium Edition Campaigns How to Guide Release 2.1 Table of Contents Campaigns Overview...3 How to create a Campaign Message...3 How to create a List...5 How to relate a Message to a List...6
Protecting your business from fraud
Protecting your business from fraud KEY TAKEAWAYS > Understand the most common types of fraud and how to identify them. > What to do if you uncover fraudulent activity or suspect you are a victim of fraud.
the barricademx end user interface documentation for barricademx users
the barricademx end user interface documentation for barricademx users BarricadeMX Plus The End User Interface This short document will show you how to use the end user web interface for the BarricadeMX
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
MySpam email filtering service Protection against spam, viruses and phishing attacks
MySpam email filtering service Protection against spam, viruses and phishing attacks 1. Introduction This MySpam guide describes the new service and changes to the University s current spam handling procedures.
Policy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
White paper. Phishing, Vishing and Smishing: Old Threats Present New Risks
White paper Phishing, Vishing and Smishing: Old Threats Present New Risks How much do you really know about phishing, vishing and smishing? Phishing, vishing, and smishing are not new threats. They have
About junk e-mail protection
About junk e-mail protection Entourage 2008 Junk E-Mail Protection Entourage has a built-in junk mail filter that helps separate junk e-mail also called spam from legitimate messages. By default, the level
Business ebanking Fraud Prevention Best Practices
Business ebanking Fraud Prevention Best Practices User ID and Password Guidelines Create a strong password with at least 8 characters that includes a combination of mixed case letters, numbers, and special
Barracuda Spam Firewall
Barracuda Spam Firewall Overview The Barracuda Spam Firewall is a network appliance that scans every piece of email our organization receives. Its main purposes are to reduce the amount of spam we receive
Microsoft and Windows are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries.
2001 2014 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks are hereby acknowledged. Microsoft and Windows are either registered
INFOCOMM SEC RITY. is INCOMPLETE WITHOUT. Be aware, responsible. secure!
INFOCOMM SEC RITY is INCOMPLETE WITHOUT Be aware, responsible secure! U HACKER Smack that What you can do with these five online security measures... ANTI-VIRUS SCAMS UPDATE FIREWALL PASSWORD FASTEN UP!
Using Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
Managing Junk Mail. About the Junk Mail Filter
Managing Junk Mail Outlook can filter out certain types of messages and send them to a separate folder to keep your Inbox from being cluttered with junk mail. Outlook can also disable links in suspicious
FAQ (Frequently Asked Questions)
FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias
SPEAR PHISHING TESTING METHODOLOGY
SPEAR PHISHING TESTING METHODOLOGY From An article on our Spear Phishing Testing which can be used in social engineering exercise to determine organization wide susceptibility to an APT style attack. Document
INET1005 May 2009 Getting Started with MyUH Email
INET1005 May 2009 Getting Started with MyUH Email Introduction Introduction... 1 Overview... 1 My E-mail Inbox Channel... 2 MyUH E-mail Center... 3 Address Book... 5 Email Options... 6 Help... 6 Exit...
How To Protect Your Online Banking From Fraud
DETECT MONITORING SERVICES AND DETECT SAFE BROWSING: Empowering Tools to Prevent Account Takeovers SUMMARY The Federal Financial Institutions Examination Council (FFIEC) is planning to update online transaction
Frequently Asked Questions The next section includes FAQs to help you to access and use your student email account.
Factsheet 22 Student Email September 2011 This factsheet can be made available in alternative formats. Please make your request at the Library Help Desk, telephone 01642 342100 or email [email protected]
Quarantined Messages 5 What are quarantined messages? 5 What username and password do I use to access my quarantined messages? 5
Contents Paul Bunyan Net Email Filter 1 What is the Paul Bunyan Net Email Filter? 1 How do I get to the Email Filter? 1 How do I release a message from the Email Filter? 1 How do I delete messages listed
Guidelines for E-mail Account Management and Effective E-mail Usage
Guidelines for E-mail Account Management and Effective E-mail Usage October 2014 Version 1.0 Department of Electronics and Information Technology Ministry of Communications and Information Technology Government
Mimecast Services for Outlook (MSO4)
Mimecast Services for Outlook (MSO4) End User Quick Start Guide for Outlook 2010/2013 Mimecast Services for Outlook (MSO 4) is a software application that integrates with your Microsoft Outlook. Once installed,
SCORECARD EMAIL MARKETING. Find Out How Much You Are Really Getting Out of Your Email Marketing
EMAIL MARKETING SCORECARD Find Out How Much You Are Really Getting Out of Your Email Marketing This guide is designed to help you self-assess your email sending activities. There are two ways to render
M+ Guardian Email Firewall. 1. Introduction
M+ Guardian Email Firewall 1. Introduction This information is designed to help you efficiently and effectively manage unsolicited e mail sent to your e mail account, otherwise known as spam. MCCC now
Spam Management. Manage your FOPE Spam Quarantine
Spam Management Alverno College uses two tools for email spam management: Microsoft s Forefront Online Protection for Exchange (FOPE) filters spam before it reaches your inbox. FOPE will send you periodic
ITSC Training Courses Student IT Competence Programme SIIS1 Information Security
ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know
Barracuda Email Security Service User Guide
Barracuda Email Security Service User Guide The Barracuda Email Security Service is a cloud-based email security service that protects both inbound and outbound email against the latest spam, viruses,
MX LOGIC SPAM FILTERING
MX LOGIC SPAM FILTERING 21 March 2009, Version 1.0 WHAT IS MX LOGIC? In response to the large amount of spam received on KickStart email addresses, the organization has enlisted MX Logic, a hosted filtering
Outlook Web Access (OWA) with Exchange Server 2007 (Windows version)
Outlook Web Access (OWA) with Exchange Server 2007 (Windows version) 1. Login into your Baylor email account via a web browser such as Internet Explorer, Fire Fox, or Netscape. The web URL is still http://mail.baylor.edu/
Business Internet Banking / Cash Management Fraud Prevention Best Practices
Business Internet Banking / Cash Management Fraud Prevention Best Practices This document provides fraud prevention best practices that can be used as a training tool to educate new Users within your organization
Secure Mail Registration and Viewing Procedures
Secure Mail Registration and Viewing Procedures May 2011 For External Secure Mail Recipients Contents This document provides a brief, end user oriented overview of the Associated Banc Corp s Secure Email
Email Spam Filtering Sophos
SPAM FILTERING Spam, or unsolicited bulk email, is problem many email users encounter. Niagara College is no exception. Some estimates report that the volume of spam doubles every four to eight months.
eprism Email Security Suite
FAQ V8.3 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered trademarks
Welcome to HomeTown Bank s Secure E-mail! User Guide
Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the
SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015
SPAM, VIRUSES AND PHISHING, OH MY! Michael Starks, CISSP, CISA ISSA Fellow 10/08/2015 The Usual Players Indebtedness for driving on toll road Transaction receipts Notice to appear Major and Emerging Trends
E-MAIL FILTERING FAQ
V8.3 E-MAIL FILTERING FAQ COLTON.COM Why? Why are we switching from Postini? The Postini product and service was acquired by Google in 2007. In 2011 Google announced it would discontinue Postini. Replacement:
Configuration Information
This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,
AVG AntiVirus. How does this benefit you?
AVG AntiVirus Award-winning antivirus protection detects, blocks, and removes viruses and malware from your company s PCs and servers. And like all of our cloud services, there are no license numbers to
Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam
Admin Guide Boundary Defense for Email Email Anti-Virus & Anti-Spam DOCUMENT REVISION DATE: October, 2010 Boundary Defense for Email Admin Guide / Table of Contents Page 2 of 34 Table of Contents 1 INTRODUCTION...
Email Protection for your account
User Guide Revision A SaaS Email Protection Email Protection for your account The Email Protection service works in the cloud to protect your email account from spam, viruses, worms, phishing scams, and
Cybersecurity Best Practices
Ten Essential Cybersecurity Best Practices Banking Business Employees Brought to you by: 1 Did you know? One in five small-to-medium-sized companies were the victims of cyber breaches in 2013.1 In 76%
Tracking E-mail Campaigns with G-Lock Analytics
User Guide Tracking E-mail Campaigns with G-Lock Analytics Copyright 2009 G-Lock Software. All Rights Reserved. Table of Contents Introduction... 3 Creating User Account on G-Lock Analytics. 4 Downloading
WEBMAIL USER MANUAL AN INTRODUCTION TO WLINK WEBMAIL. Table of content:
WEBMAIL USER MANUAL Table of content: An introduction to Wlink WebMail Interface guide Read/Delete Email Compose/Send Email Attachment Searching Email Message filter Spam setting Whitelist/Blacklist Email
CSUF Tech Day 2015. Security Awareness Overview Dale Coddington, Information Security Office [email protected]
CSUF Tech Day 2015 Security Awareness Overview Dale Coddington, Information Security Office [email protected] Agenda Introduction Large scale data breaches: 2014 and beyond Email based attacks:
MECnet Portal: Using Web-Based Email
User Manual MECnet Portal: Using Web-Based Email Salem Public Schools Salem, Massachusetts Table of Contents Logging in at School or at Home................................. 3 The Top Navigation Bar........................................
Vodafone Hosted Services. Getting your email. User guide
Vodafone Hosted Services Getting your email User guide Welcome. This guide will show you how to get your email, now that it is hosted by Vodafone Hosted Services. Once you ve set it up, you will be able
mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212
mycampus Portal Student Email ASU Network Software Student Edition ASU IT Services 082212 YOUR STUDENT ACCOUNT AND EMAIL INFORMATION Are you admitted to ASU? If so, congratulations! You have an ASU account!
Policy for Social Media Usage in Catawba County
Policy for Social Media Usage in Catawba County Adopted March 1, 2010 Revised September 7,2010 1. PURPOSE The role of technology in the 21 st century workplace is constantly expanding and now includes
Malicious Email Mitigation Strategy Guide
CYBER SECURITY OPERATIONS CENTRE Malicious Email Mitigation Strategy Guide Introduction (UPDATED) SEPTEMBER 2012 1. Socially engineered emails containing malicious attachments and embedded links are commonly
Plesk 7.6 For Windows E-mail User Guide
SWsoft, Inc. Plesk 7.6 For Windows E-mail User Guide (Revision 1.0) (c) 1999-2006 ISBN: N/A SWsoft, Inc. 13755 Sunrise Valley Drive Suite 325 Herndon VA 20171 USA Phone: +1 (703) 815 5670 Fax: +1 (703)
Network Service, Systems and Data Communications Monitoring Policy
Network Service, Systems and Data Communications Monitoring Policy Purpose This Policy defines the environment and circumstances under which Network Service, Systems and Data Communications Monitoring
CISCO SECURE MAIL. External User Guide. 1/15/15 Samson V.
1/15/15 Samson V. 1. These instructions are for users who reside outside the University of Colorado Denver that receive encrypted emails from faculty or staff of UC Denver. As a part of our HIPAA compliance
Encrypted Email Users Guide. Revised 6/8/2015
Encrypted Email Users Guide Revised 6/8/2015 Contents Encrypted email service overview Registering, activating and maintaining an account Online Help Accessing the encrypted email portal screens Downloading
SK International Journal of Multidisciplinary Research Hub
ISSN: 2394 3122 (Online) Volume 2, Issue 9, September 2015 Journal for all Subjects Research Article / Survey Paper / Case Study Published By: SK Publisher (www.skpublisher.com) Novel Method to Protect
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
DATA PROTECTION. OneWorld Encrypted Messages USER GUIDE
DATA PROTECTION OneWorld Encrypted Messages USER GUIDE Table of Contents 1 Why use Encrypted emails?... 3 2 Activation and Login... 4 2.1 Activating Your New OneWorld Encrypted Messages Account... 4 2.2
