[{"@context":"https:\/\/schema.org\/","@type":"BlogPosting","@id":"https:\/\/univista.com\/posts\/when-in-doubt-throw-it-out-e-g-delete-move-to-trash\/#BlogPosting","mainEntityOfPage":"https:\/\/univista.com\/posts\/when-in-doubt-throw-it-out-e-g-delete-move-to-trash\/","headline":"When In Doubt, Throw It Out! e.g Delete. Move to Trash.","name":"When In Doubt, Throw It Out! e.g Delete. Move to Trash.","description":"In light of recent world events, it\u2019s more important than ever to remain vigilant in regard to Cybersecurity.\u00a0 Numerous online threats and scams are, and will continue to be, on the rise.\u00a0 As I\u2019m sure you have heard the warning before, but it always bears repeating, do not open emails or links from unknown sources, [&hellip;]","datePublished":"2022-03-07","dateModified":"2022-03-07","author":{"@type":"Person","@id":"https:\/\/univista.com\/posts\/author\/kasha-ford\/#Person","name":"Kasha Ford","url":"https:\/\/univista.com\/posts\/author\/kasha-ford\/","identifier":10,"image":{"@type":"ImageObject","@id":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/33eaeba24c23d4bf81db53e38627da1da0c1604cefd8066b39afba2a7b297c69?s=96&d=mm&r=g","height":96,"width":96}},"publisher":{"@type":"Organization","name":"UniVista","logo":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2018\/03\/Univista-Logo-e1522352689794.png","width":600,"height":60}},"image":{"@type":"ImageObject","@id":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","url":"https:\/\/univista.com\/wp-content\/uploads\/2017\/11\/Ping-Logo-300x126.png","height":"250","width":"595"},"url":"https:\/\/univista.com\/posts\/when-in-doubt-throw-it-out-e-g-delete-move-to-trash\/","about":["Uncategorized"],"wordCount":466,"articleBody":"In light of recent world events, it\u2019s more important than ever to remain vigilant in regard to Cybersecurity.\u00a0 Numerous online threats and scams are, and will continue to be, on the rise.\u00a0 As I\u2019m sure you have heard the warning before, but it always bears repeating, do not open emails or links from unknown sources, this also goes for voice calls and texts.\u00a0\u00a0REMEMBER!\u00a0 UniVista Support Agreement includes cybersecurity training.Stay alert to the following\u2026Potentially Fraudulent Situations may involve:Phishing Emails. Be wary of faked logos with links going to fake pages asking you for information.\u00a0 For example: an email coming from PayPal that something just seems off on\u2026 this often has a \u201cfrom\u201d that does not follow typical company email naming conventions.\u00a0 e.g. something like; paypal.paypal@gmail.com.\u00a0 Legitimate sites will not send you emails asking you for personal information, like logons and passwords outside of their legitimate platform.\u00a0Spear Phishing. Cybercriminals will use easily available online information, like social media pages and company websites to harvest personal information to make fake corporate emails look legitimate. Then cybercriminals target individuals within the organization using those specific names, titles, along with familiar emails or phone numbers, making it look like the email came from within the organization and is a legitimate request.Whaling Emails. This form of contact also uses public information to get details regarding a high level manager or corporate CEO, then uses a similar email to theirs to make a request like \u201ctake a look at the attachment\u201d.\u00a0 Be on the alert for abnormal requests.Vishing and\/or Smishing. This technique is used in the form of a voice call,Phishing: Don&#8217;t Fall For It!typically during stressful times of the day, where the recipient is requested to take certain actions or give specific personal information. Similarly, a text version (Smishing) with a link can also be sent requesting an action be taken. A popular example of both forms is callers or texters pretending to be the Internal Revenue Service.Angler Phishing. Popular on social media platforms, in this scenario a cybercriminal will use direct messaging or fake notifications to encourage an unsuspecting individual to take action. These typically include links that take individuals to malicious websites.It\u2019s important during these heightened times to remain vigilant against potential cybersecurity threats.\u00a0 If something seems \u201coff\u201d and your \u201cSpidey-senses start tingling\u201d, even just a little, don\u2019t do it. Unfortunately, stressful or challenging times for honest people are when most opportunistic cybercriminals attack.\u00a0Remember, your UniVista Support Agreement includes cybersecurity training.\u00a0 If you\u2019re unsure and need a refresher, or you have new employees that require training please let us know.\u00a0 If you have any questions or concerns, please don\u2019t hesitate to contact your UniVista Account Representative."},{"@context":"https:\/\/schema.org\/","@type":"BreadcrumbList","itemListElement":[{"@type":"ListItem","position":1,"name":"Posts","item":"https:\/\/univista.com\/posts\/#breadcrumbitem"},{"@type":"ListItem","position":2,"name":"When In Doubt, Throw It Out! e.g Delete. Move to Trash.","item":"https:\/\/univista.com\/posts\/when-in-doubt-throw-it-out-e-g-delete-move-to-trash\/#breadcrumbitem"}]}]