{"id":1878,"date":"2018-04-16T16:03:42","date_gmt":"2018-04-16T20:03:42","guid":{"rendered":"https:\/\/www.monmouth.edu\/technology\/phishing-protection\/"},"modified":"2025-08-13T16:21:03","modified_gmt":"2025-08-13T20:21:03","slug":"cybersecurity","status":"publish","type":"page","link":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/","title":{"rendered":"Fighting Cybercrime"},"content":{"rendered":"<h3 class=\"wp-block-heading\" id=\"best-practices-to-help-protect-yourself-from-online-fraud\">Best practices to help protect yourself from online fraud<\/h3>\n\n\n<ul class=\"wp-block-list\">\n<li>Never reply to e-mail messages that request your personal information. Be very suspicious of any e-mail message from a business or person that asks for your personal information \u2014 or one that sends your personal information and asks you to update or confirm it.&nbsp; Instead, use the publicly available contact information such as contacting the MU Help Desk if the e-mail is purported to pertain to a Monmouth University service.<\/li>\n\n\n\n<li>Don&#8217;t click links in suspicious e-mail.<\/li>\n\n\n\n<li>Don&#8217;t click a link contained in a suspicious message.&nbsp;Instead, visit Web sites by typing their URL into your browser or by using your Favorites link.&nbsp; Do not copy and paste links from messages into your browser.<\/li>\n\n\n\n<li>Change your password regularly or if you suspect any compromise. Once you have made the password change notify the provider of the service\/account in question directly regarding the possibility of fraud or compromise.<\/li>\n\n\n\n<li>Don&#8217;t send personal information in regular e-mail messages. Regular e-mail messages are not encrypted and are like sending a post card, anyone whose hands it passes through can read its content.<\/li>\n\n\n\n<li>Do business only with companies you know and trust. A legitimate business Web site should always have a privacy statement that specifically states that the business won&#8217;t pass your name and information to other people.<\/li>\n\n\n\n<li>Make sure the Web site uses encryption when personal information is being transacted. The Web address should be preceded by https:\/\/ instead of the usual http:\/\/ in the browser&#8217;s address bar.&nbsp; Also, double-click the lock icon on your browser&#8217;s status bar to display the digital certificate for the site.&nbsp; The name that follows \u201cIssued to\u201d in the certificate should match the site that you think you&#8217;re on.&nbsp; If you suspect that a Web site is not what it should be, leave the site immediately and report it.&nbsp; Don&#8217;t follow any of the instructions it presents.<\/li>\n\n\n\n<li>Monitor your transactions. Review your order confirmations and credit card and bank statements as soon as you receive them to make sure that you&#8217;re being charged only for transactions you made.&nbsp; Immediately report any irregularities in your accounts by dialing the number shown on your account statement.&nbsp; Using just one credit card for online purchases makes it easier to track your transactions.<\/li>\n\n\n\n<li>Use credit cards for transactions on the Internet. In most locales, your personal liability in case someone compromises your credit card is significantly limited.&nbsp; By contrast, if you use direct debit from your bank account or a debit card, your personal liability frequently is the full balance of your bank account.&nbsp; In addition, a credit card with a small credit limit is preferable for use on the Internet because it limits the amount of money that a thief can steal in case the card is compromised.&nbsp; Better yet, several major credit card issuers are now offering customers the option of shopping online with virtual, single-use credit card numbers, which expire within one or two months.&nbsp; For more details, ask your bank about perishable virtual credit card numbers.<\/li>\n<\/ul>\n\n\n<h3 class=\"wp-block-heading\" id=\"how-can-you-tell-if-an-email-message-is-a-fraud\">How can you tell if an e-mail message is a fraud?<\/h3>\n\n\n<p>Unfortunately, as phishing attacks become more sophisticated, it is very difficult to tell if a message is fraudulent.&nbsp; That is why phishing schemes are so prevalent and successful for criminals.&nbsp; For example, many phony e-mail messages link to real company logos of well-known brands; however, there are things you can be on the lookout for:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Requests for personal information in an e-mail message<\/strong>.<br>Most legitimate businesses have a policy that they do not ask you for your personal information through e-mail.&nbsp; Be very suspicious of a message that asks for personal information even if it might look legitimate.<\/li>\n\n\n\n<li><strong>Urgent wording<\/strong>.<br>Wording in phishing e-mail messages is usually polite and accommodating in tone. &nbsp;It almost always tries to get you to respond to the message or to click the link that is included.&nbsp; To increase the number of responses, criminals attempt to create a sense of urgency so that people immediately respond without thinking.&nbsp; Usually, fake e-mail messages are NOT personalized, while valid messages from your bank or e-commerce company generally are.<\/li>\n\n\n\n<li><strong>Fake links<\/strong>.<br>Phishers are getting very sophisticated in their ability to create misleading links to the point where it is impossible for the average person to tell if the link is legitimate or not.&nbsp; It&#8217;s always best to type in the Web address or URL you know is correct into your browser.&nbsp; Also you can save the correct URL to your browser \u201cFavorites.\u201d&nbsp; Do not copy and paste URLs from messages into your browser.&nbsp; Some of the techniques that criminals have used in the past to fake links are as follows:<\/li>\n\n\n\n<li><strong>Message body is an image not text. <\/strong><br>To avoid detection by spam filters, fake e-mail messages used in phishing schemes often use an image instead of text in the message body.&nbsp; If the sent spam message uses real text, the Outlook Junk E-mail Filter will very likely move the message to the Junk E-mail folder.&nbsp; The message body image is usually a hyperlink, you can tell because when you rest the pointer on the message body, the pointer becomes a hand.<\/li>\n\n\n\n<li><strong>Promises that seem too good to be true. <\/strong><br>Use common sense and be suspicious when you are offered money or discounts that seem too good to be true.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"573\" height=\"1024\" src=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-573x1024.jpg\" alt=\"\" class=\"wp-image-1881\" style=\"width:700px\" srcset=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-573x1024.jpg 573w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-168x300.jpg 168w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-768x1373.jpg 768w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-1120x2002.jpg 1120w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-560x1001.jpg 560w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-280x501.jpg 280w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-320x572.jpg 320w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-640x1144.jpg 640w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-1400x2503.jpg 1400w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-1024x1830.jpg 1024w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-360x644.jpg 360w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-1119x2000.jpg 1119w, https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02.jpg 1440w\" sizes=\"auto, (max-width: 573px) 100vw, 573px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div style=\"height:100px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Phishing Protection<br \/>\n How can you tell if an e-mail message is a fraud?<\/p>\n<p> Unfortunately, as phishing attacks become more sophisticated, it is very difficult to tell if a message is fraudulent.\u00a0 That is why phishing schemes are so prevalent and successful for criminals.\u00a0 For example, many phony e-mail messages link to real company logos of well-known brands; however, there are things you can be on the lookout for:<\/p>\n<p> Requests for personal information in an e-mail message.\u00a0 Most legitimate businesses have a policy that they do not ask you for your personal information through e-mail.\u00a0 Be very suspicious of a message that asks for personal information even if it might look legitimate.<\/p>\n<p> \u00a0<br \/>\n Urgent wording.\u00a0 Wording in phishing e-mail messages is usually polite and accommodating in tone. \u00a0It almost always tries to get you to respond to the message or to click the link that is included.\u00a0 To increase the number of responses, criminals attempt to create a sense of urgency so that people immediately respond without thinking.\u00a0 Usually, fake e-mail messages are NOT personalized, while valid messages from your bank or e-commerce company generally are.<\/p>\n<p> \u00a0<br \/>\n Fake links.\u00a0 Phishers are getting very sophisticated in their ability to create misleading links to the point where it is impossible for the average person to tell if the link is legitimate or not.\u00a0 It&#8217;s always best to type in the Web address or URL you know is correct into your browser.\u00a0 Also you can save the correct URL to your browser \u201cFavorites.\u201d\u00a0 Do not copy and paste URLs from messages into your browser.\u00a0 Some of the techniques that criminals have used in the past to fake links are as follows:<\/p>\n<p> \u00a0<br \/>\n Message body is an image not text. \u00a0To avoid detection by spam filters, fake e-mail messages used in phishing schemes often use an image instead of text in the message body.\u00a0 If the sent spam message uses real text, the Outlook Junk E-mail Filter will very likely move the message to the Junk E-mail folder.\u00a0 The message body image is usually a hyperlink, you can tell because when you rest the pointer on the message body, the pointer becomes a hand.<\/p>\n<p> \u00a0<br \/>\n Promises that seem too good to be true. \u00a0Use common sense and be suspicious when you are offered money or discounts that seem too good to be true.<\/p>\n<p> Best practices to help protect yourself from online fraud<\/p>\n<p> Never reply to e-mail messages that request your personal information.\u00a0 Be very suspicious of any e-mail message from a business or person that asks for your personal information \u2014 or one that sends you personal information and asks you to update or confirm it.\u00a0 Instead, use the publicly available contact information such as contacting the MU Help Desk if the e-mail is purported to pertain to a Monmouth University service.<\/p>\n<p> \u00a0<br \/>\n Don&#8217;t click links in suspicious e-mail.\u00a0 Don&#8217;t click a link contained in a suspicious message.\u00a0 Instead, visit Web sites by typing their URL into your browser or by using your Favorites link.\u00a0 Do not copy and paste links from messages into your browser.<\/p>\n<p> \u00a0<br \/>\n Change your password regularly or if you suspect any compromise.\u00a0 Once you have made the password change notify the provider of the service\/account in question directly regarding the possibility of fraud or compromise.<\/p>\n<p> \u00a0<br \/>\n Don&#8217;t send personal information in regular e-mail messages.\u00a0 Regular e-mail messages are not encrypted and are like sending a post card, anyone whose hands it passes through can read its content.<\/p>\n<p> \u00a0<br \/>\n Do business only with companies you know and trust.\u00a0 A legitimate business Web site should always have a privacy statement that specifically states that the business won&#8217;t pass your name and information to other people.<\/p>\n<p> \u00a0<br \/>\n Make sure the Web site uses encryption when personal information is being transacted.\u00a0 The Web address should be preceded by https:\/\/ instead of the usual http:\/\/ in the browser&#8217;s address bar.\u00a0 Also, double-click the lock icon on your browser&#8217;s status bar to display the digital certificate for the site.\u00a0 The name that follows \u201cIssued to\u201d in the certificate should match the site that you think you&#8217;re on.\u00a0 If you suspect that a Web site is not what it should be, leave the site immediately and report it.\u00a0 Don&#8217;t follow any of the instructions it presents.<\/p>\n<p> \u00a0<br \/>\n Monitor your transactions.\u00a0 Review your order confirmations and credit card and bank statements as soon as you receive them to make sure that you&#8217;re being charged only for transactions you made.\u00a0 Immediately report any irregularities in your accounts by dialing the number shown on your account statement.\u00a0 Using just one credit card for online purchases makes it easier to track your transactions.<\/p>\n<p> \u00a0<br \/>\n Use credit cards for transactions on the Internet.\u00a0 In most locales, your personal liability in case someone compromises your credit card is significantly limited.\u00a0 By contrast, if you use direct debit from your bank account or a debit card, your personal liability frequently is the full balance of your bank account.\u00a0 In addition, a credit card with a small credit limit is preferable for use on the Internet because it limits the amount of money that a thief can steal in case the card is compromised.\u00a0 Better yet, several major credit card issuers are now offering customers the option of shopping online with virtual, single-use credit card numbers, which expire within one or two months.\u00a0 For more details, ask your bank about perishable virtual credit card numbers.\n <\/p>\n","protected":false},"author":15,"featured_media":0,"parent":2696,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_mu_eop_enabled":false,"_mu_eop_name":"","_mu_eop_name_override":false,"_mu_eop_description":"","_mu_eop_description_override":false,"_mu_eop_url":"","_mu_eop_url_override":false,"_mu_eop_program_type":"","_mu_eop_educational_credential":"","_mu_eop_time_to_complete":"","_mu_eop_number_of_credits":"","_mu_eop_occupational_category":"","_mu_eop_occupational_category_code":"","_mu_eop_program_prerequisites":"","_mu_eop_application_deadline":"","_mu_eop_application_start_date":"","_mu_eop_start_date":"","_mu_eop_end_date":"","_mu_eop_day_of_week":"","_mu_eop_time_of_day":"","_mu_eop_educational_program_mode":"","_mu_eop_financial_aid_eligible":"","_mu_eop_maximum_enrollment":"","_mu_eop_offers_price":"","_mu_eop_offers_currency":"USD","_mu_eop_offers_price_per":"","_mu_eop_offers_preset":"","_mu_eop_salary_upon_completion":"","_mu_eop_training_salary":"","_mu_eop_recognized_by_name":"","_mu_eop_recognized_by_url":"","_mu_eop_concentrations":"","_mu_eop_identifier_cip":"","_mu_eop_provider_name":"","_mu_eop_provider_name_override":false,"_mu_eop_provider_url":"","_mu_eop_provider_address":"","_mu_eop_provider_city":"","_mu_eop_provider_state":"","_mu_eop_provider_zip":"","_mu_eop_provider_country":"","footnotes":""},"class_list":["post-1878","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Fighting Cybercrime | Campus Technology | Monmouth University<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fighting Cybercrime | Campus Technology\" \/>\n<meta property=\"og:description\" content=\"Phishing Protection How can you tell if an e-mail message is a fraud?  Unfortunately, as phishing attacks become more sophisticated, it is very difficult to tell if a message is fraudulent.\u00a0 That is why phishing schemes are so prevalent and successful for criminals.\u00a0 For example, many phony e-mail messages link to real company logos of well-known brands; however, there are things you can be on the lookout for:   Requests for personal information in an e-mail message.\u00a0 Most legitimate businesses have a policy that they do not ask you for your personal information through e-mail.\u00a0 Be very suspicious of a message that asks for personal information even if it might look legitimate.  \u00a0 Urgent wording.\u00a0 Wording in phishing e-mail messages is usually polite and accommodating in tone. \u00a0It almost always tries to get you to respond to the message or to click the link that is included.\u00a0 To increase the number of responses, criminals attempt to create a sense of urgency so that people immediately respond without thinking.\u00a0 Usually, fake e-mail messages are NOT personalized, while valid messages from your bank or e-commerce company generally are.  \u00a0 Fake links.\u00a0 Phishers are getting very sophisticated in their ability to create misleading links to the point where it is impossible for the average person to tell if the link is legitimate or not.\u00a0 It&#039;s always best to type in the Web address or URL you know is correct into your browser.\u00a0 Also you can save the correct URL to your browser \u201cFavorites.\u201d\u00a0 Do not copy and paste URLs from messages into your browser.\u00a0 Some of the techniques that criminals have used in the past to fake links are as follows:  \u00a0 Message body is an image not text. \u00a0To avoid detection by spam filters, fake e-mail messages used in phishing schemes often use an image instead of text in the message body.\u00a0 If the sent spam message uses real text, the Outlook Junk E-mail Filter will very likely move the message to the Junk E-mail folder.\u00a0 The message body image is usually a hyperlink, you can tell because when you rest the pointer on the message body, the pointer becomes a hand.  \u00a0 Promises that seem too good to be true. \u00a0Use common sense and be suspicious when you are offered money or discounts that seem too good to be true.  Best practices to help protect yourself from online fraud   Never reply to e-mail messages that request your personal information.\u00a0 Be very suspicious of any e-mail message from a business or person that asks for your personal information \u2014 or one that sends you personal information and asks you to update or confirm it.\u00a0 Instead, use the publicly available contact information such as contacting the MU Help Desk if the e-mail is purported to pertain to a Monmouth University service.  \u00a0 Don&#039;t click links in suspicious e-mail.\u00a0 Don&#039;t click a link contained in a suspicious message.\u00a0 Instead, visit Web sites by typing their URL into your browser or by using your Favorites link.\u00a0 Do not copy and paste links from messages into your browser.  \u00a0 Change your password regularly or if you suspect any compromise.\u00a0 Once you have made the password change notify the provider of the service\/account in question directly regarding the possibility of fraud or compromise.  \u00a0 Don&#039;t send personal information in regular e-mail messages.\u00a0 Regular e-mail messages are not encrypted and are like sending a post card, anyone whose hands it passes through can read its content.  \u00a0 Do business only with companies you know and trust.\u00a0 A legitimate business Web site should always have a privacy statement that specifically states that the business won&#039;t pass your name and information to other people.  \u00a0 Make sure the Web site uses encryption when personal information is being transacted.\u00a0 The Web address should be preceded by https:\/\/ instead of the usual http:\/\/ in the browser&#039;s address bar.\u00a0 Also, double-click the lock icon on your browser&#039;s status bar to display the digital certificate for the site.\u00a0 The name that follows \u201cIssued to\u201d in the certificate should match the site that you think you&#039;re on.\u00a0 If you suspect that a Web site is not what it should be, leave the site immediately and report it.\u00a0 Don&#039;t follow any of the instructions it presents.  \u00a0 Monitor your transactions.\u00a0 Review your order confirmations and credit card and bank statements as soon as you receive them to make sure that you&#039;re being charged only for transactions you made.\u00a0 Immediately report any irregularities in your accounts by dialing the number shown on your account statement.\u00a0 Using just one credit card for online purchases makes it easier to track your transactions.  \u00a0 Use credit cards for transactions on the Internet.\u00a0 In most locales, your personal liability in case someone compromises your credit card is significantly limited.\u00a0 By contrast, if you use direct debit from your bank account or a debit card, your personal liability frequently is the full balance of your bank account.\u00a0 In addition, a credit card with a small credit limit is preferable for use on the Internet because it limits the amount of money that a thief can steal in case the card is compromised.\u00a0 Better yet, several major credit card issuers are now offering customers the option of shopping online with virtual, single-use credit card numbers, which expire within one or two months.\u00a0 For more details, ask your bank about perishable virtual credit card numbers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Campus Technology\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T20:21:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"2574\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/\",\"url\":\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/\",\"name\":\"Fighting Cybercrime | Campus Technology\",\"isPartOf\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-573x1024.jpg\",\"datePublished\":\"2018-04-16T20:03:42+00:00\",\"dateModified\":\"2025-08-13T20:21:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#primaryimage\",\"url\":\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02.jpg\",\"contentUrl\":\"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02.jpg\",\"width\":1440,\"height\":2574},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.monmouth.edu\/technology\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Support\",\"item\":\"https:\/\/www.monmouth.edu\/technology\/support\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Fighting Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.monmouth.edu\/technology\/#website\",\"url\":\"https:\/\/www.monmouth.edu\/technology\/\",\"name\":\"Campus Technology\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.monmouth.edu\/technology\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Fighting Cybercrime | Campus Technology | Monmouth University","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Fighting Cybercrime | Campus Technology","og_description":"Phishing Protection How can you tell if an e-mail message is a fraud?  Unfortunately, as phishing attacks become more sophisticated, it is very difficult to tell if a message is fraudulent.\u00a0 That is why phishing schemes are so prevalent and successful for criminals.\u00a0 For example, many phony e-mail messages link to real company logos of well-known brands; however, there are things you can be on the lookout for:   Requests for personal information in an e-mail message.\u00a0 Most legitimate businesses have a policy that they do not ask you for your personal information through e-mail.\u00a0 Be very suspicious of a message that asks for personal information even if it might look legitimate.  \u00a0 Urgent wording.\u00a0 Wording in phishing e-mail messages is usually polite and accommodating in tone. \u00a0It almost always tries to get you to respond to the message or to click the link that is included.\u00a0 To increase the number of responses, criminals attempt to create a sense of urgency so that people immediately respond without thinking.\u00a0 Usually, fake e-mail messages are NOT personalized, while valid messages from your bank or e-commerce company generally are.  \u00a0 Fake links.\u00a0 Phishers are getting very sophisticated in their ability to create misleading links to the point where it is impossible for the average person to tell if the link is legitimate or not.\u00a0 It's always best to type in the Web address or URL you know is correct into your browser.\u00a0 Also you can save the correct URL to your browser \u201cFavorites.\u201d\u00a0 Do not copy and paste URLs from messages into your browser.\u00a0 Some of the techniques that criminals have used in the past to fake links are as follows:  \u00a0 Message body is an image not text. \u00a0To avoid detection by spam filters, fake e-mail messages used in phishing schemes often use an image instead of text in the message body.\u00a0 If the sent spam message uses real text, the Outlook Junk E-mail Filter will very likely move the message to the Junk E-mail folder.\u00a0 The message body image is usually a hyperlink, you can tell because when you rest the pointer on the message body, the pointer becomes a hand.  \u00a0 Promises that seem too good to be true. \u00a0Use common sense and be suspicious when you are offered money or discounts that seem too good to be true.  Best practices to help protect yourself from online fraud   Never reply to e-mail messages that request your personal information.\u00a0 Be very suspicious of any e-mail message from a business or person that asks for your personal information \u2014 or one that sends you personal information and asks you to update or confirm it.\u00a0 Instead, use the publicly available contact information such as contacting the MU Help Desk if the e-mail is purported to pertain to a Monmouth University service.  \u00a0 Don't click links in suspicious e-mail.\u00a0 Don't click a link contained in a suspicious message.\u00a0 Instead, visit Web sites by typing their URL into your browser or by using your Favorites link.\u00a0 Do not copy and paste links from messages into your browser.  \u00a0 Change your password regularly or if you suspect any compromise.\u00a0 Once you have made the password change notify the provider of the service\/account in question directly regarding the possibility of fraud or compromise.  \u00a0 Don't send personal information in regular e-mail messages.\u00a0 Regular e-mail messages are not encrypted and are like sending a post card, anyone whose hands it passes through can read its content.  \u00a0 Do business only with companies you know and trust.\u00a0 A legitimate business Web site should always have a privacy statement that specifically states that the business won't pass your name and information to other people.  \u00a0 Make sure the Web site uses encryption when personal information is being transacted.\u00a0 The Web address should be preceded by https:\/\/ instead of the usual http:\/\/ in the browser's address bar.\u00a0 Also, double-click the lock icon on your browser's status bar to display the digital certificate for the site.\u00a0 The name that follows \u201cIssued to\u201d in the certificate should match the site that you think you're on.\u00a0 If you suspect that a Web site is not what it should be, leave the site immediately and report it.\u00a0 Don't follow any of the instructions it presents.  \u00a0 Monitor your transactions.\u00a0 Review your order confirmations and credit card and bank statements as soon as you receive them to make sure that you're being charged only for transactions you made.\u00a0 Immediately report any irregularities in your accounts by dialing the number shown on your account statement.\u00a0 Using just one credit card for online purchases makes it easier to track your transactions.  \u00a0 Use credit cards for transactions on the Internet.\u00a0 In most locales, your personal liability in case someone compromises your credit card is significantly limited.\u00a0 By contrast, if you use direct debit from your bank account or a debit card, your personal liability frequently is the full balance of your bank account.\u00a0 In addition, a credit card with a small credit limit is preferable for use on the Internet because it limits the amount of money that a thief can steal in case the card is compromised.\u00a0 Better yet, several major credit card issuers are now offering customers the option of shopping online with virtual, single-use credit card numbers, which expire within one or two months.\u00a0 For more details, ask your bank about perishable virtual credit card numbers.","og_url":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/","og_site_name":"Campus Technology","article_modified_time":"2025-08-13T20:21:03+00:00","og_image":[{"width":1440,"height":2574,"url":"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/","url":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/","name":"Fighting Cybercrime | Campus Technology","isPartOf":{"@id":"https:\/\/www.monmouth.edu\/technology\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02-573x1024.jpg","datePublished":"2018-04-16T20:03:42+00:00","dateModified":"2025-08-13T20:21:03+00:00","breadcrumb":{"@id":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#primaryimage","url":"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02.jpg","contentUrl":"https:\/\/www.monmouth.edu\/technology\/wp-content\/uploads\/sites\/291\/2018\/04\/phishing-web-02.jpg","width":1440,"height":2574},{"@type":"BreadcrumbList","@id":"https:\/\/www.monmouth.edu\/technology\/support\/cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.monmouth.edu\/technology\/"},{"@type":"ListItem","position":2,"name":"Support","item":"https:\/\/www.monmouth.edu\/technology\/support\/"},{"@type":"ListItem","position":3,"name":"Fighting Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.monmouth.edu\/technology\/#website","url":"https:\/\/www.monmouth.edu\/technology\/","name":"Campus Technology","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.monmouth.edu\/technology\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/1878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/comments?post=1878"}],"version-history":[{"count":28,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/1878\/revisions"}],"predecessor-version":[{"id":5612,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/1878\/revisions\/5612"}],"up":[{"embeddable":true,"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/pages\/2696"}],"wp:attachment":[{"href":"https:\/\/www.monmouth.edu\/technology\/wp-json\/wp\/v2\/media?parent=1878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}