1. Learn to identify suspicious emails
  2. Learn about and protect against spear phishing
  3. Lock it Down (Mobile device security)

Identify & Report suspicious email

When you receive email messages, always consider whether they are legitimate.  Even if they seem plausible, if you have any doubts, take a close look and consider whether you detect any warning signs.  If anything looks suspicious, do not open attachments or reply to the message.  Contact the purported sender directly using their official email address or other means and verify the legitimacy of the message.

Suspicious email should also be forwarded as an attachment to the Security Operations Centre (SOC).

Click on the image for a larger view.

Email security poster

View image long descriptionPhishing attack example poster.

View image long description

Lock it down (mobile device security)

For more information search #UWlockitdown on Twitter.

For more information: