MS-ISAC: Phight the phish by learning to identify malicious emails

Error message
In order to filter by the "in queue" property, you need to add the Entityqueue: Queue relationship.-
County NewsOctober is Cybersecurity Awareness Month, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) wants to help empower the community with information on how to combat a cyber-attack known as phishing.MS-ISAC: Phight the phish by learning to identify malicious emailsOctober 11, 2021October 11, 2021, 11:45 am
-
County News Article
MS-ISAC: Phight the phish by learning to identify malicious emails
October is Cybersecurity Awareness Month, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) wants to help empower the community with information on how to combat a cyber-attack known as phishing. Phishing is when a cybercriminal sends an email that aims to trick the recipient into providing personal information or into becoming infected with malicious software that can steal such information or cause other forms of damage. The cybercriminal will often purport to be sending this email from a trusted or legitimate source, such as a known business or organization that you may commonly deal with.
Tactics used in phishing attacks commonly aim to lure you into opening attachments, responding with personal information, or clicking links that download malicious software or bring you to a fraudulent form for collecting your information.
Persuasive language and a sense of urgency are common ways that cybercriminals capture attention and accomplish their malicious goals. Common examples include fraudulent shipping notifications, false fraud warnings on your account, requests to verify information on your account, or offers that seem too good to be true.
Below are a few steps you can take to identify and appropriately react to Phishing emails.
- Check the email address of the sender. Carefully examine if the sender’s email address is correctly spelled, as attackers commonly may use a special character or one-letter spelling mistake to approximate a legitimate looking email address.
- Hover over links to see where they really go. By hovering your cursor over a link, you can see the address it will really take you to rather than simply what the displayed text says. Avoid clicking shortened links, especially when received from untrusted sources, as they cannot be easily examined in this way.
- Avoid opening attachments. Don’t open attachments from untrusted sources and be wary of ones you are not expecting to receive from known contacts.
- Don’t share personal or private information over email. Especially do not provide such information in response to an unsolicited email you received.
- When in doubt, contact the real organization or sender! If you aren’t expecting the email, it asks for personal information or credentials, or it seems suspicious, contact the person or organization through known contact methods. For example, if the email states it is from your bank and they urgently need to speak to you, call them through the customer support line you have used in the past or is publicly listed, not via the method referenced in the email.
- Report phishing emails. Report suspicious emails received at work to your Information Technology (IT) help desk or contact. Emails you receive personally can always be reported to www.ic3.gov.
Additionally, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has created a guide linked below to educate people on how to identify, understand, and safely or securely react to such attacks. The link to other CISA Cybersecurity Awareness Month resources is also below:
- Phishing tip sheet
- Cybersecurity Awareness Month publications
- To learn more about being cyber secure, head to the link below to find the MS-ISAC’s Monthly Cybersecurity Newsletter that has materials on a number of cybersecurity topics. Sign up here
October is Cybersecurity Awareness Month, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) wants to help empower the community with information on how to combat a cyber-attack known as phishing.2021-10-11County News Article2021-10-13
October is Cybersecurity Awareness Month, and the Multi-State Information Sharing and Analysis Center (MS-ISAC) wants to help empower the community with information on how to combat a cyber-attack known as phishing. Phishing is when a cybercriminal sends an email that aims to trick the recipient into providing personal information or into becoming infected with malicious software that can steal such information or cause other forms of damage. The cybercriminal will often purport to be sending this email from a trusted or legitimate source, such as a known business or organization that you may commonly deal with.
Tactics used in phishing attacks commonly aim to lure you into opening attachments, responding with personal information, or clicking links that download malicious software or bring you to a fraudulent form for collecting your information.
Persuasive language and a sense of urgency are common ways that cybercriminals capture attention and accomplish their malicious goals. Common examples include fraudulent shipping notifications, false fraud warnings on your account, requests to verify information on your account, or offers that seem too good to be true.
Below are a few steps you can take to identify and appropriately react to Phishing emails.
- Check the email address of the sender. Carefully examine if the sender’s email address is correctly spelled, as attackers commonly may use a special character or one-letter spelling mistake to approximate a legitimate looking email address.
- Hover over links to see where they really go. By hovering your cursor over a link, you can see the address it will really take you to rather than simply what the displayed text says. Avoid clicking shortened links, especially when received from untrusted sources, as they cannot be easily examined in this way.
- Avoid opening attachments. Don’t open attachments from untrusted sources and be wary of ones you are not expecting to receive from known contacts.
- Don’t share personal or private information over email. Especially do not provide such information in response to an unsolicited email you received.
- When in doubt, contact the real organization or sender! If you aren’t expecting the email, it asks for personal information or credentials, or it seems suspicious, contact the person or organization through known contact methods. For example, if the email states it is from your bank and they urgently need to speak to you, call them through the customer support line you have used in the past or is publicly listed, not via the method referenced in the email.
- Report phishing emails. Report suspicious emails received at work to your Information Technology (IT) help desk or contact. Emails you receive personally can always be reported to www.ic3.gov.
Additionally, the U.S. Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency (CISA) has created a guide linked below to educate people on how to identify, understand, and safely or securely react to such attacks. The link to other CISA Cybersecurity Awareness Month resources is also below:
- Phishing tip sheet
- Cybersecurity Awareness Month publications
- To learn more about being cyber secure, head to the link below to find the MS-ISAC’s Monthly Cybersecurity Newsletter that has materials on a number of cybersecurity topics. Sign up here
-
Blog
Data sharing paramount in modern county operations
Everyone wants data. Everyone needs authoritative data. GIS is the underlying infrastructure for sharing data instantly in your county. -
Webinar
Ring in the New Year with a Strong Records Management Strategy – A Fireside Chat
Dec. 14, 2022 , 1:00 pm – 2:00 pmUnable to attend? Watch the recording here. As we near the start of a new year, many of us are already thinking about our New Year’s resolutions. What if one of your resolutions was better records management? -
Webinar
In Whole-of-State Cybersecurity, Counties are Not Only One Piece of the Pie
Dec. 12, 2022 , 1:00 pm – 2:00 pmUnable to attend? Watch the recording here. -
Webinar
Familiar Faces Initiative Data-Sharing Technology for Behavioral Health and Justice Learning Series: IBM
Dec. 8, 2022 , 2:00 pm – 2:30 pmUnable to attend? Watch the recording here. -
Webinar
FFI Data-Sharing Technology for Behavioral Health & Justice Learning Series: NICE
Dec. 1, 2022 , 2:00 pm – 2:30 pmJoin NACo and the Familiar Faces Initiative (FFI) for a series of webinars highlighting new technologies that share and integrate data across local behavioral health, health and justice systems. Cross-system data-sharing enables jurisdictions to identify their familiar faces—residents -
Blog
How municipalities can better manage snow events
Municipalities can now tap into the smart features of RUBICONSmartCity’s platform for an entirely new Public Works category: snow removal. Using Rubicon’s simple in-cab interface and desktop portal, users can set priority streets, view all snow removal vehicles at once, provide digital turn-by-turn directions to drivers, track route progress and completion, and ensure all streets get plowed.
Related Resources
-
Blog
Bipartisan legislation reintroduced to fund Next Generation 911 systems
On March 24, Reps. Anna Eshoo (D-Calif.) and Richard Hudson (R-N.C.) reintroduced the Next Generation 9-1-1 Act of 2023 with the goal of modernizing aging 911 systems across the nation to Next-Generation 911 technology. -
County News
‘When we’re not connected, we’re not safe,’ because buildings block radio
In a room packed with about 100 conference attendees, Guilford County, N.C. Commissioner Alan Perdue gave a powerful presentation Saturday morning on the importance of clear communication among emergency responders. -
County News
TikTok: It’s hip, it’s fun and it’s a security risk
What threat does TikTok pose to data security, and how should counties regulate its use on government-issued devices?
-
-
Reports & Toolkits
NACo Technology Guide for County Leaders: Workforce
The NACo County Technology Advisory Council, with input from the Tech Xchange and the NACo Workforce Advisory Board, has developed a guide on workforce retention and recruitment for technology workers. This guide provides an overview, along with benefits and questions to consider in the technology recruitment and retention process -
Policy Brief
Support the Deployment of Next Generation 911 Bill
Urge your Members of Congress to support legislation to provide funding for the deployment of Next Generation 9-1-1 and for other purposes. Introduced by Sen. Amy Klobuchar (D-Minn.) in the previous Congress, the legislation would provide for the establishment of Next Generation 9-1-1 and would vastly improve interoperability with regards to all emergency communication systems. The bill would also establish a Next Generation 9-1-1 cybersecurity center to coordinate with state, local and regional governments to detect and prevent cybersecurity intrusions related to Next Generation 9-1-1.
Related Events
More From
-
Outreach Toolkit for Counties: the FCC’s Affordable Connectivity Program
Through the FCC's Affordable Connectivity Program, counties have a central role in providing all residents with an equal chance to connect to high-speed internet in their homes.
Learn More