You need to be logged in to see your course progress.

How to Prevent Phishing


Online Safety

0 POINTS

Complete the units, enroll in new courses, answer survey questions

By gaining points, you can win a personalised one on one coaching session

Complete the course to see how your learning has improved and gain 10 points

Answer the questions in each unit to generate your custom action plan and gain points

Collect points to be able to ask an expert any question you may have

Unit Video

Unit Summary

In this unit, you will learn how to safeguard yourself from phishing threats. Phishing is the attempt to steal sensitive information such as usernames, passwords, and credit card details by disguising as a trustworthy entity in an electronic communication.

Survey Questions

You cannot view this unit as you're not logged in yet.

Build Your Action Plan

Here are 8 things you can do to safeguard yourself from phishing threats:
  • Always be aware of the content of the email that is sent to you, never press suspicious links.
  • Be very careful of emails requesting sensitive information.
  • Always check to make sure that the site is verified by checking the actual email address that is sent to you and the displayed name.
  • Phishers sometimes use scare tactics like threatening to cancel a service in case you fail to update information.
  • Don’t sign up and put your email in sites or forms when you don’t have to. Most of the spam and junk you have received is a result of you signing up to certain websites.
  • Never input sensitive information in forms that are present in suspicious emails.
  • Instead of pressing links in emails, input the links yourself to prevent being tricked into going to a false site.
  • Check for HTTPS (secure connection on the site) at the start of the website link to make sure that the website you are using is not a fake one.
  • The best software to protect yourself is your own common sense, and if something doesn’t look right, chances are it really isn’t.

"The spy act prohibits keystroke logging, hijacking, and phishing." - Cliff Stearns