Cybersecurity
Phishing attacks aim to trick you into revealing sensitive information by posing as legitimate communicatios. These attacks often come in the form of e-mails, texts or pop-ups.
- Look for red flags: Phishing messages often contain spelling mistakes, urgent language or unfamiliar links. If something seems off, it probably is.
- Verify requests for information: Before responding to any request for sensitive information, verify the identity of the sender by contacting them through official channels.
- Avoid clicking on suspicious links: Hover over links to check the URL before clicking and avoid opening attachments or clicking on links in unsolicited e-mails.
Last modified: Thu Sep 25 16:19:03 SAST 2025