Module 3 Unit 2

I am sure that most of us have, at some stage of our digital life, received a request from a person pretending that they are a representative from a company which we deal with. They will usually request you to reveal personal information such as address, contact numbers and login details (including passwords) to specific sites. They may also provide a hyperlink where they request that e.g. your password be changed.
The above is referred to as a 'phishing' attack.
The golden rule when receiving such requests is the following:
Watch the videos below which will provide you with clear explanations of what phishing is as well as what 'red flags' you need to look out for when you are a victim of phishing.
Think you got it? Test yourself with this little quiz.