{"id":282,"date":"2014-02-05T09:07:38","date_gmt":"2014-02-05T15:07:38","guid":{"rendered":"http:\/\/blogs.luc.edu\/uiso\/?p=282"},"modified":"2024-04-16T21:46:13","modified_gmt":"2024-04-16T21:46:13","slug":"visual-tips-on-identifying-phishing-emails","status":"publish","type":"post","link":"https:\/\/blogs.luc.edu\/uiso\/visual-tips-on-identifying-phishing-emails\/","title":{"rendered":"Visual Tips On Identifying Phishing Emails"},"content":{"rendered":"<p><a href=\"http:\/\/blogs.sans.org\/securingthehuman\/files\/2014\/01\/STH-Poster-DontGetHooked-Email.jpg\"><img loading=\"lazy\" decoding=\"async\" alt=\"\" src=\"http:\/\/blogs.sans.org\/securingthehuman\/files\/2014\/01\/STH-Poster-DontGetHooked-Email.jpg\" width=\"450\" height=\"300\" \/><\/a><\/p>\n<p>Click <a href=\"http:\/\/blogs.sans.org\/securingthehuman\/files\/2014\/01\/STH-Poster-DontGetHooked-Email.jpg\">here<\/a> for the full size image.<\/p>\n<p>The poster above gives a great visual example of specific things to look out for when identifying a possible spam email.<\/p>\n<p>&#8220;The poster was developed as a community project. We would like to thank the following people for their invaluable expertise and experience in developing this poster.<\/p>\n<ul>\n<li>Cheryl Conley (Lockheed Martin)<\/li>\n<li>Tim Harwood (British Petroleum)<\/li>\n<li>Tonia Dudley (Honeywell)<\/li>\n<li>Ellen Powers (MITRE)<\/li>\n<li>Shanah Johnson (Reserve Bank of Atlanta)<\/li>\n<li>Terri Chihota&#8221;<\/li>\n<\/ul>\n<div><strong>Don\u2019t forget, Loyola will never send you an email containing a link to provide your username and password.\u00a0<\/strong>As always, if you receive a suspicious email, forward it to\u00a0<a href=\"mailto:datasecurity@luc.edu\">datasecurity@luc.edu<\/a>.<\/div>\n<p>Source: <a href=\"http:\/\/www.securingthehuman.org\/blog\/2014\/01\/05\/new-security-awareness-poster-dont-get-hooked\">www.securingthehuman.org<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Click here for the full size image. The poster above gives a great visual example of specific things to look out for when identifying a possible spam email. &#8220;The poster was developed as a community project. We would like to thank the following people for their invaluable expertise and experience in developing this poster. Cheryl [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2,8],"tags":[],"class_list":["post-282","post","type-post","status-publish","format-standard","hentry","category-front-page","category-tips"],"_links":{"self":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":1,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/282\/revisions"}],"predecessor-version":[{"id":2090,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/posts\/282\/revisions\/2090"}],"wp:attachment":[{"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/media?parent=282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/categories?post=282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.luc.edu\/uiso\/wp-json\/wp\/v2\/tags?post=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}