Phishing and Other Threats

  • There are many cyber threats that you should be aware of. Phishing and Malware are two of the most common types of threats. Learn how to identify and avoid these threats. Learn to mitigate technology-related risks while getting the most out of your computing environment by addressing the risks associating with receiving phishing attempts and downloading programs and other “freebies” over the internet.


    Information about phishing emails and how to protect against them.

    Learn About Malware 

    Malware is a category of software that can be installed on your PC without you even realizing it. Malware is a type of software that is installed on your computer (either knowingly or unknowingly) when you simply access a malicious website or install certain “free” applications (i.e., torrent apps, web search toolbar, etc.).

    The malware can generate pop-up ads on your PC, take you to unintended websites, or even monitor activity on your PC such as the websites that you visit and the keystrokes that you type.

    The US Computer Emergency Readiness Team provides an excellent overview of malware. Please take the time to review this brief article on Recognizing and Avoiding Malware.

    Combat Malware on Your PC

    Here are some steps that you can take to avoid and combat malware:

    • Avoid installing “free” web search toolbars and other internet-based applications (Kazaa, Gator, etc.).
    • Reboot and log on to your PC daily to make sure that you have the most current security patches and virus signature updates.
    • Be alert for unusual behavior on your PC, like seeing unexpected toolbars that get added to your web browser, excessive pop-up ads, unusual search results, web browser activity that takes you to unintended pages, very sluggish response, etc.
    • Any time that you are concerned about unusual behavior with your PC, use a spyware/adware detection tool such as MalwareBytes.
    • When malware is suspected, a virus scan is also recommended.