Create an Account - Increase your productivity, customize your experience, and engage in information you care about.
A phishing attack is when an email is sent from someone who poses as a reliable source and tricks a user into giving away financial information or allowing access to a network. This stolen information is then used to extort a person or organization.
Show All Answers
Make sure you do the following when choosing a new Windows password:
The email may appear to be from a legitimate source or include infected links and attachments that seem harmless, so it's sometimes hard to tell. This seemingly harmless email will try to steal financial information or could contain a virus called ransomware. Watch this short video to learn how to distinguish a potentially harmful email.
VIDEO- "What is Phishing and How do I Protect Myself?" (2 min 28 sec)
A real E-fax will always show as being from email@example.com. If it's not from this email, please do not open, forward, or download it, just delete it.
You should NEVER open, respond to, or forward emails that may be a threat. If you believe HR, IT, or Accounting may need your assistance, call them directly. NEVER send sensitive information (passwords, banking info, Social Security, etc.) via email. Do not download attachments or click on links without double checking that the sender is legitimate.
These alerts should always be taken seriously- please notify Blount County IT immediately.
If you think anything is wrong with your computer, remove the blue Ethernet cable or disconnect from WiFi completely, then turn off your computer. Disconnecting yourself is the best way to prevent a virus from spreading, and it will never hurt your computer. If you suspect anything, you should always disconnect then call IT at 865-273-5730 (do not enter a ticket) ASAP.
Ransomware is a virus that locks your computer and demands a ransom for the release of your files. They often appear as a harmless email, link, or download and don't reveal themselves until it's too late. Watch the video below to see an example of ransomware. Note that a ransomware attack can happen in many different ways or may look different, but any type of ransomware is still harmful.
VIDEO- Ransomware Simulation (3 min 12 sec)
Follow all of the security processes listed above (browsing the web with caution, staying alert for phishing attacks, being cautious of what content you download or run, etc.), and if you do happen to become infected, unplug your blue Ethernet cable or remove yourself from WiFi completely, and turn off your computer IMMEDIATELY. Removing yourself from the network may prevent the ransomware from spreading through the network and infecting more files. Aside from that, there's not much anyone can do after they have been infected besides lose files or tons of money, so its vital that we avoid it in the first place, but no pressure.
Make sure you lease sites that have suspicious pop-ups or give warnings of malware. Always check that a site has "https://" at the beginning. Check out the video below for more.
VIDEO- Internet Safety: Your Browser's Security Features (2 min 21 sec)