

In addition to being suspicious about situations like the one described here, never provide personal information when it is not legitimately necessary, or to people or companies you don’t personally know. Note: Often questions about personal information are optional. It is even possible that there is a fourth newsletter that asks for day of birth as one of the activation questions. The parent company or service can combine individual pieces of seemingly-harmless information and use or sell it for identity theft. Possible answer: All three newsletters probably have the same parent company or are distributed through the same service. Question: What do you think might be going on here? Among the questions she was asked in order to activate her subscriptions, one magazine asked for her month of birth, a second asked for her year of birth, and a third asked for her mother's maiden name. Real-life Scenario: One of the staff members in I.T.S. Finally, some websites and links look legitimate, but they're really hoaxes designed to steal your information. Email addresses can be faked, so just because the email says it is from someone you know, you can’t be certain of this without checking with the person.Ĥ. Also, in some cases just clicking on a malicious link can infect a computer, so unless you are sure a link is safe, don’t click on it.ģ. Some attachments contain viruses or other malicious programs, so just in general, it’s risky to open unknown or unsolicited attachments.Ģ. You need to click on the attachment to see the card.ġ. If you receive phishing or spam in your Google email, report it to Google: Ī friend sends an electronic Hallmark greeting card (e-card) to your work email.
ABC BOX COMPANY PAYROLL DIRECT DEPOSIT PASSWORD
You should never disclose your password to anyone, even if they say they work for UCSC, ITS, or other campus organizations. Don't respond to email, instant messages (IM), texts, phone calls, etc., asking you for your password or other personal information.

This email is a classic example of “phishing” – trying to trick you into “biting”. *Name (first and last): *Email Login: *Password: *Date of birth: *Alternate email: Please contact the Webmail Team with any questions. If we do not receive this information from you by the end of the week, your email account will be closed. You are required to send the following information in order to continue using your email account. You receive the following email from the Help Desk:ĭear UCSC Email User, Beginning next week, we will be deleting all inactive email accounts in order to create space for more users. If pressured further, report the situation to management, the ITS Support Center or the Whistleblower Office ( ). User-ID's and passwords must not be shared. C: Decline the request and remind your supervisor that it is against UC policy.Ĭ - Decline the request and remind your supervisor that it is against UC policy.B: Ignore the request and hope she forgets.A: It’s your boss, so it’s okay to do this.Your supervisor is very busy and asks you to log into the HR Server using her user-ID and password to retrieve some reports. Security Self-Test: Questions and Scenarios (Text-Only Version)
