You are now in the main content area

Cybersecurity Awareness Month: Strengthening Your Login Security

Learn how to identify the common traits of phishing emails.
Category:Cybersecurity Awareness Month
October 16, 2017

For Faculty and Staff

Monday, October 16, 2017

Cybersecurity Awareness Month: Have you been phished?

To: All faculty and staff

In a previous Ryerson test, 20 per cent of people were tricked into clicking a malicious link in an email. In our current campaign, we’ve started to send out fake phishing emails and another is on the way - did you spot and report them?

Chances to win a $200 gift card

We're so keen for you to learn about your impact on cybersecurity that we're giving away 5 gift cards of $200!

Here’s what you need to do for a chance to win:

  1. During October, report at least three Ryerson test phishing emails to spamrec@torontomu.ca, and
  2. Don’t click on suspicious links or open attachments in more than three of these emails.

Find the full contest details.

“I don’t open emails anymore, so I’m safe.”

Remember - it’s generally safe to open emails but clicking links and downloading attachments can be risky. Leaving emails unopened can help, but you may miss important messages, for example, from us! Instead, familiarize yourself on how to spot the malicious ones.

Your phish-spotting cheat sheet: Common traits of phishing emails

Check out our easy tips on how to spot phishing emails, report them and make one of those $200 gift cards yours.

  • The sender's address is suspicious.
  • The "To" field is blank or for another person.
  • The email includes typos or grammatical errors.
  • The message contains an urgent request for personal information.
  • The message requires immediate action to avoid a problem like losing access to your Ryerson account.
  • When you hover over a link or button in the email, it directs you to an address (usually suspicious) unrelated to the text in the link.

We've provided some samples to help you detect phishing emails. Many of these examples are derived from actual phishing emails that were sent to Ryerson email addresses. The links in these examples have been slightly modified to make them less dangerous but please don't attempt to visit these sites!

Suspicious senders

Here is an example of an email that claims to be from FedEx where the actual address is from specweldfab.revitalsite.comabc.

Example of a strange email address in a phishing email

It’s always worth taking a moment to carefully check the full email address of the sender.

Urgent requests for personal information

Here’s an example of an urgent request:

Example of a phishing email

This fake message includes tell-tale grammatical errors and demands you take action to avoid losing access to your account.

Suspicious links

Hovering over a link with your mouse and carefully checking the URL is one of the best ways to detect a phishing email. If you are using a tablet or smartphone, carefully press and hold the link, rather than tap, to reveal the true URL. Here's an example of a link that goes to a fake Ryerson login page hosted in a server in another country.

If you hover over the link without clicking you will see a very long URL (it may appear in the bottom-left of your browser) like this:

Example of a phishing link in an email

It may remind you of what you see in the location field of your browser when you log into the my.ryerson.ca portal - but it is not the same. Here is the valid address that you see when you login to my.ryerson.ca:

https://cas.ryerson.ca/login?​service=https%3A%2F%2F​my.ryerson.ca%2FLogin

Aside from the fact the fake link is longer, how can you tell which one is a link to a server at Ryerson and which one is not?

  1. The legitimate URL has a forward slash after cas.ryerson.ca/
  2. Another give away is that the fake URL starts with http:// while the valid one starts with https://. Ryerson login pages will always start with the secure https://
Think that was too easy?

Here is a fake URL that has been well-crafted to look like a Ryerson address:

https://cas-ryerson.com/login?​service=https%3A%2F%3F​my.ryerson.ca%2FLogin

Notice how a hyphen has replaced the dot and the hostname ends in .com instead of .ca.

If you aren't sure about a link, type a link that you know is correct like my.ryerson.ca or fedex.com into the location bar of your browser instead of clicking.

What about Google Apps links?

The Ryerson community makes extensive use of Google Apps including Drive, Calendar, and Groups. The URLs for these applications can be very long but they all start with a hostname that ends with .google.com:

The hostname always ends before the first forward slash with .google.com/

Some attackers have used personal Google accounts and Google Forms to try to get people to "login" to a Google Form. This is relatively easy to spot because Google Forms don't look like Ryerson's or Google's login screens. Google has even added a warning at the bottom of every Google Form that says: "Never submit passwords through Google Forms."

Report a phishing email

Questions?

Visit the Cybersecurity Awareness Month campaign page for more on building your online self-defence and for chances to win prizes.

If you have further questions, please contact the Computing and Communications Services Help Desk at help@torontomu.ca or 416-979-5300, ext. 556806.

For Students

Monday, October 16, 2017

Cybersecurity Awareness Month: Have you been phished?

To: All students

In a previous Ryerson test, 20 per cent of people were tricked into clicking a malicious link in an email. In our current campaign, we’ve started to send out fake phishing emails and another is on the way - did you spot and report them?

Chances to win a $200 gift card

We're so keen for you to learn about your impact on cybersecurity that we're giving away 5 gift cards of $200!

Here’s what you need to do for a chance to win:

  1. During October, report at least three Ryerson test phishing emails to spamrec@torontomu.ca, and
  2. Don’t click on suspicious links or open attachments in more than three of these emails.

Find the full contest details.

“I don’t open emails anymore, so I’m safe.”

Remember - it’s generally safe to open emails but clicking links and downloading attachments can be risky. Leaving emails unopened can help, but you may miss important messages, for example, from us! Instead, familiarize yourself on how to spot the malicious ones.

Your phish-spotting cheat sheet: Common traits of phishing emails

Check out our easy tips on how to spot phishing emails, report them and make one of those $200 gift cards yours.

  • The sender's address is suspicious.
  • The "To" field is blank or for another person.
  • The email includes typos or grammatical errors.
  • The message contains an urgent request for personal information.
  • The message requires immediate action to avoid a problem like losing access to your Ryerson account.
  • When you hover over a link or button in the email, it directs you to an address (usually suspicious) unrelated to the text in the link.

We've provided some samples to help you detect phishing emails. Many of these examples are derived from actual phishing emails that were sent to Ryerson email addresses. The links in these examples have been slightly modified to make them less dangerous but please don't attempt to visit these sites!

Suspicious senders

Here is an example of an email that claims to be from FedEx where the actual address is from specweldfab.revitalsite.comabc.

Example of a strange email address in a phishing email

It’s always worth taking a moment to carefully check the full email address of the sender.

Urgent requests for personal information

Here’s an example of an urgent request:

Example of a phishing email

This fake message includes tell-tale grammatical errors and demands you take action to avoid losing access to your account.

Suspicious links

Hovering over a link with your mouse and carefully checking the URL is one of the best ways to detect a phishing email. If you are using a tablet or smartphone, carefully press and hold the link, rather than tap, to reveal the true URL. Here's an example of a link that goes to a fake Ryerson login page hosted in a server in another country.

If you hover over the link without clicking you will see a very long URL (it may appear in the bottom-left of your browser) like this:

Example of a phishing link in an email

It may remind you of what you see in the location field of your browser when you log into the my.ryerson.ca portal - but it is not the same. Here is the valid address that you see when you login to my.ryerson.ca:

https://cas.ryerson.ca/login?​service=https%3A%2F%2F​my.ryerson.ca%2FLogin

Aside from the fact the fake link is longer, how can you tell which one is a link to a server at Ryerson and which one is not?

  1. The legitimate URL has a forward slash after cas.ryerson.ca/
  2. Another give away is that the fake URL starts with http:// while the valid one starts with https://. Ryerson login pages will always start with the secure https://
Think that was too easy?

Here is a fake URL that has been well-crafted to look like a Ryerson address:

https://cas-ryerson.com/login?​service=https%3A%2F%3F​my.ryerson.ca%2FLogin

Notice how a hyphen has replaced the dot and the hostname ends in .com instead of .ca.

If you aren't sure about a link, type a link that you know is correct like my.ryerson.ca or fedex.com into the location bar of your browser instead of clicking.

What about Google Apps links?

The Ryerson community makes extensive use of Google Apps including Drive, Calendar, and Groups. The URLs for these applications can be very long but they all start with a hostname that ends with .google.com:

The hostname always ends before the first forward slash with .google.com/

Some attackers have used personal Google accounts and Google Forms to try to get people to "login" to a Google Form. This is relatively easy to spot because Google Forms don't look like Ryerson's or Google's login screens. Google has even added a warning at the bottom of every Google Form that says: "Never submit passwords through Google Forms."

Report a phishing email

Questions?

Visit the Cybersecurity Awareness Month campaign page for more on building your online self-defence and for chances to win prizes.

If you have further questions, please contact the Computing and Communications Services Help Desk at help@torontomu.ca or 416-979-5300, ext. 556840.