Frequently Asked Questions — Others

Phishing (pronounced ‘fishing’) is the act of fishing out sensitive personal data through the form of email fraud or fictitious websites posing as legitimate organisations.

The recipient usually receives an email purporting to be from a legitimate business e.g. PayPal, eBay or banks etc requesting the user to update/ verify personal information online. Information requested may include password, credit card number, account number, personal identification number (PIN) etc which the legitimate business already has in its records.

The emails appear to be legitimate because the senders use logos and links from the actual website, however, the link to update the user’s information points to a spoofed website resembling the actual site.

Legitimate businesses will not ask you to reveal such sensitive information. If you receive such a request, double check the URL, visit the business’ main website, or call their hotline for clarification.

You should always verify any link that asks for your personal information. Seemingly legitimate links are included in an email to take to you to an illegitimate website. To stay safe, you should only open links from trusted email sources or credible search engines to ensure authenticity.

Do not reply to an email with your personal information.

You will only be sending this information directly to the perpetrator.

Attachments contain viruses or spyware that can be embedded into your computer without knowledge.

Ensure the email is addressed, specifically to you. Fraudulent emails are often sent out in bulk and designed to address generic terms such as customer or client.

To report suspected phishing attacks, kindly download the user guides here and send results to cs@viewqwest.com.

SecureNet Security Postures lets you select a set of best practices and pre-defined security policies on your network. This lets you control how much restrictions and protection you want for your network with a single decision.

To find out more about what the different Security Postures consist of, click here.