  {"id":10925,"date":"2019-02-20T13:38:46","date_gmt":"2019-02-20T18:38:46","guid":{"rendered":"http:\/\/www.montclair.edu\/information-technology\/?p=10925"},"modified":"2019-03-12T13:48:28","modified_gmt":"2019-03-12T17:48:28","slug":"if-it-seems-phishy-it-probably-is","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/information-technology\/2019\/02\/20\/if-it-seems-phishy-it-probably-is\/","title":{"rendered":"If It Seems Phishy It Probably Is"},"content":{"rendered":"<p>Online scammers and identity thieves are continuing to get more sophisticated with their tactics, counting on you to take the bait. As we kick off the new semester, remember to watch for and don\u2019t click on emails that contain:<\/p>\n<p>\u2022Requests for your username or password<br \/>\n\u2022Warnings\/threats to suspend an account or service if you don&#8217;t click on an embedded link or provide personal information<br \/>\n\u2022Notifying you of a virus on your machine with a request to log in to a website to fix it or provide personal and\/or account information<br \/>\n\u2022Asking you to open an attachment that you don&#8217;t recognize or were not expecting to receive<\/p>\n<p>In almost all cases, if an email looks suspicious it probably is! If you doubt the validity of an email it is always a good idea to contact the sender to confirm. For more information about phishing scams and how to identify them please visit the Information Technology website at https:\/\/www.montclair.edu\/information-technology\/security\/phishing\/.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online scammers and identity thieves are continuing to get more sophisticated with their tactics, counting on you to take the bait. As we kick off the new semester, remember to watch for and don\u2019t click on emails that contain: \u2022Requests for your username or password \u2022Warnings\/threats to suspend an account or service if you don&#8217;t [&hellip;]<\/p>\n","protected":false},"author":119,"featured_media":11107,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[],"class_list":["post-10925","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/10925","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/users\/119"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=10925"}],"version-history":[{"count":1,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/10925\/revisions"}],"predecessor-version":[{"id":10926,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/10925\/revisions\/10926"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media\/11107"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=10925"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=10925"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=10925"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}