Safe Email Practices and Protecting Against Phishing

Lumberjacks,

As we continue to rely on email for our daily communication, it is crucial to remain vigilant against potential phishing attacks. Cyber threats are constantly evolving, and it is important to take proactive steps to protect our data and systems.

Safe Email Practices

  1. Be Cautious with Links and Attachments:
    • Avoid clicking on links or downloading attachments from unknown or unexpected sources.
    • Verify the sender's email address before taking any action.
  2. Look Out for Suspicious Emails:
    • Be wary of emails that create a sense of urgency or pressure you to provide personal information.
    • Check for spelling and grammatical errors, which are common in phishing emails.
  3. Verify Requests for Sensitive Information:
    • Legitimate organizations will never ask for sensitive information, such as passwords or social security numbers, via email.
    • When in doubt, contact the organization directly using a trusted contact method.

Two-Factor Exhaustion

Two-factor authentication (2FA) is a critical layer of security for your accounts. However, attackers may attempt to exploit this by sending repeated 2FA requests in hopes that you will eventually approve one out of frustration. This tactic is known as "two-factor exhaustion."

What to Do:

  • If you receive unexpected or multiple 2FA prompts, do not approve them.
  • Immediately report such incidents to the Help Desk for further assistance.

Need Help? Contact the Help Desk

If you suspect that your account has been compromised or need help resetting your password, please reach out to the Help Desk immediately. Our team is here to assist you with any concerns and ensure your account remains secure.

Help Desk Contact Information:

  • Phone: 936-468-4357
  • Email: helpdesk@sfasu.edu
  • Online Support Portal: help.sfasu.edu

Thank you for your attention to this important matter. By following these best practices and staying vigilant, we can collectively protect our community from cyber threats.

Print Article

Details

Article ID: 162917
Created
Wed 7/3/24 2:48 PM
Modified
Wed 7/3/24 2:48 PM