The primary responsibility for protecting yourself from phishers lies with YOU. Here are some steps you can take:
Increase your Google account security
- Activate Google 2-Step Verification.
- Use this on both your personal and NC State Gmail accounts.
Be on guard
- Be wary of any email with an urgent request for personal, account or financial information.
- NEVER give your Unity password to anyone for any reason.
- Assume that EVERY email request for your password is fraudulent.
- Unless an email is digitally signed (a method of authenticating digital information), assume it’s not authentic.
Don’t fill out a form on a website unless you know it is secure.
- Communicate credit card and other account information only through a secure website or over the telephone.
- To ensure that you’re on a secure web server, look for “https” in its address in your browser’s address bar.
- Look for a padlock or key symbol, usually at the bottom of your browser window (not in the web page window).
- Double click on that symbol to see the security certificate for the site.
- Make sure that it matches the site you think you’re visiting.
- But beware – a scammer may also use a secure website!
Regularly check your bank, credit and debit card statements (paper and online)
- Verify each account at least once a month.
- Ensure that all transactions are legitimate.
- If anything is suspicious, contact your bank and all card issuers.
Ensure that your browser is up to date
- Make sure you apply the latest security updates.
- If you use Microsoft Internet Explorer (IE), go to Internet Explorer help and make sure you have the latest version for your operating system.
If you’re using Windows 10 and IE, consider upgrading to Microsoft Edge.
Install and maintain antivirus and anti-spyware software
- Some phishing email may contain software that can track your activities, disrupt your computer or simply slow it down.
- Detect, manage and delete these threats by installing effective antivirus software and anti-spyware.
- Keep it updated, either automatically or by downloading updates manually from the manufacturer’s website.
Privacy Rights Clearinghouse: Identity Theft: What to do if it Happens to You
Go to the Phishing main page.