Tips: Confront A Phishing Attack

SpamStopsHere offers tips on how to proceed when confronted with a suspected phishing attack.

1. If an e-mail asks you to log-in to your bank, PayPal, eBay or other personal account, assume it is a phishing scam.

2. Never enter banking information, social security numbers or other sensitive information into any web site that resulted from clicking a link in an e-mail.

3. Never enter your computer user name and password into any e-mail that requests it, not even if it claims to be from your IT manager or other co- worker. It is easy for a spammer to forge the sender's name.

4. If you unsure as to the legitimacy of a particular e-mail, open an Internet browser and manually type in the URL of the institution in question, e.g. "www.chase.com". Do not use the URL in the e-mail as a reference, as it may be a forgery.

Featured

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.