- Top 10 Computer Security Tips
- Securing Confidential Electronic Data
- Network Access Controls
- How to retrieve a lost mobile/smartphone?
- Security Documents
- Security for Mobile/Smartphones
- Cloud Computing Security Best Practices
Ryerson is receiving an increasing number of "phishing" emails. Phishing emails are designed to deceive you into giving away confidential information like your Ryerson username and password, credit card number or bank account information. This page provides guidance on how to recognize phishing emails so you can report them and delete them.
Common traits of phishing emails:
Here is an example where the sender is pretending the email is from a ryerson address, but the actual address is really from uniswa.szabc.
Here is an example of an email that claims to be from FedEx where the actual address is from specweldfab.revitalsite.comabc.
It’s always worth taking a moment to carefully check the full email address of the sender.
Here is part of an urgent request that included a link to a fake Ryerson login page:
Here’s another example of an urgent request:
Both of these fake messages include tell-tale grammatical errors and demand you take action to avoid losing access to your account.
Hovering over a link with your mouse and carefully checking the URL is one of the best ways to detect a phishing email. If you are using a tablet or smartphone carefully press and hold the link, rather than tap, to reveal the true URL. Here's an example of a link that goes to a fake Ryerson login page hosted in a server in another country.
If you hover over the link without clicking you will see a very long URL (it may appear in the bottom-left of your browser) like this:
It may remind you of what you see in the location field of your browser when you log into the my.ryerson.ca portal. But it is not the same. Here is the valid address that you see when you login to my.ryerson.ca:
Aside from the fact the fake link is longer, how can you tell which one is a link to a server at Ryerson and which one is not?
Here is fake URL that has been well-crafted to look like a Ryerson address:
Notice how a hyphen has replaced the dot. A valid Ryerson host name that isn’t simply http://ryerson.ca must end with .ryerson.ca/
Let's look at two fedex URLs. Which one takes you to a Fedex site and which one to somewhere more dangerous?
To tell the difference, locate the first forward slash after the https://:
The first link takes you to the real fedex.com site. The second just has fedex in the name.
If you aren't sure about a link, type a link that you know is correct like my.ryerson.ca or fedex.com into the location bar of your browser instead of clicking.
The Ryerson community makes extensive use of Google Apps including Drive, Calendar, and Groups. The URLs for these applications can be very long but they all start with a host name that ends with .google.com:
The host name always ends before the first forward slash with .google.com/
Some attackers have used personal Google accounts and Google Forms to try to get people to "login" to a Google Form. This is relatively easy to spot because Google Forms don't look like Ryerson's or Google's login screens. Google has even added a warning at the bottom of every Google Form that says: "Never submit passwords through Google Forms."