Information Security Support

Tags Phishing Spam

Best Practices and Tips:

At GCC, we prioritize the security and protection of our digital environment. As part of our ongoing efforts to combat phishing attempts and ensure the safety of our systems and data, we encourage you to report any suspicious emails promptly.
Your vigilance plays a vital role in maintaining a secure workplace for all of us.

To report a potential phishing email, please follow the steps outlined below:

  1. Open the suspicious email message.

  2. Locate and click on the Phish Alert icon, which is shaped like a fishing hook from your email interface 
    Phish Alert Button Icon

    -OR-

    Next to the "Reply" button, you will find three vertical dots (the More settings menu). Click on these dots to access additional options. From the drop-down menu, select "Report phishing."
    This action will notify our IT security team and prompt them to investigate the email further.


By reporting phishing attempts, you contribute to our collective efforts in identifying and neutralizing potential security threats. Remember, your actions can safeguard not only your own information but also protect your colleagues and the entire organization from cyber risks.

Additionally, please keep the following tips in mind to stay vigilant against phishing attempts:

  • Be cautious of emails requesting sensitive information, such as passwords, credit card details, or gift card numbers. We will never ask for such information.

  • Personal ID verification requests like date of birth, home address, or social security numbers will never be requested via email.

  • Verify the email sender's address carefully, paying attention to any slight variations or misspellings that may indicate a fraudulent email.

  • Exercise caution when clicking on links or downloading attachments from unknown or suspicious sources.

  • Report any suspicious emails even if you are uncertain. Our IT security team can assist in determining the legitimacy of the message.

Remember, your role as a valued member of our organization is vital in maintaining a secure digital environment for everyone. If you have any questions or require further assistance, please don't hesitate to reach out to our IT service desk. Thank you for your continued commitment to the security of our systems and data.

 
Request Support

Details

Service ID: 67
Created
Mon 1/22/24 9:47 AM
Modified
Wed 2/28/24 8:48 AM