Skip To Main Content

Logo Image

Oneida-Herkimer-Madison BOCES logo in white on a dark blue background

Logo Title

Email Phishing

Avoiding Email Phishing Attacks

Phishing emails are one of the most common and effective methods cyber attackers will use to gain access to secure information.

  • Check the "from" field to verify the sender.
  • Hover over links within emails with your cursor to verify URLs.
  • If you are unsure an email is authentic, verify with the sender.
  • Think about the subject matter of an email and if it makes sense.
  • Report suspicious email to your IT Department.
     
  • Never send sensitive information through unencrypted email.
  • Never open files attached to emails you do not recognize.
  • Never click on links in emails without verifying the destination.
  • Never click "Enable Macros" in unknown documents.
  • Never respond or reply to spam in any way. Delete it.
     

Email - What to Watch For:

  • From an Unrecognized Sender;
  • Please Click Link or Attachment;
  • Strange Subject Matter;
  • Bad Grammar or Spelling;
  • Offers and Deals;
  • Urgent or Threatening Requests;
  • Requests for Credentials;
  • Requests for Personal Information.