-
- About Us
- Regulations
-
IT Services
- Accessibility and Disability
- Web Apps
- Teaching Support
- U.Porto Card
-
Accounts and Passwords
- Web Hosting
- Change/Recover Password
- Institutional Authentication
- Configure Forwarding in Microsoft Outlook 365
- Email Account (Lecturers and Staff)
- Email Account (Students)
- Google for Education
- HPC and Grid Computing
- Virtual Machines to Support Teaching and Research
- Microsoft Office 365 (Lecturers and Staff)
- Microsoft Office 365 (Students)
- Email Service
-
Printing
- Logging In to Printing Devices
- Load Quota
- Copying
- Scanning
- Web Printing
- Printing (Release Jobs to Print Devices)
- Printing From Institutional Equipment (Using PaperCut MF Client)
- Printing From Personal Devices (Installing Mobility Print)
- Printing From Personal Devices with Linux Operating System (Installing Mobility Print)
- Pricing
- Printing Service
- Website of the Printing Service
-
Networks and Connectivity
- Mobile Communications
- Wired Network
- Telephony (VoIP)
- VPN - Android (Manual Configuration)
- VPN - Android (FEUP Manual Configuration: SSL Check Point® Capsule)
- VPN - iOS (Automatic Configuration)
- VPN - iOS (Manual Configuration)
- VPN - iOS (FEUP Manual Configuration: SSL Check Point Capsule)
- VPN - Mac (Automatic Configuration)
- VPN - Mac (Manual Configuration)
- VPN - Mac (FEUP Manual Configuration: SSL Check Point Endpoint)
- VPN - Windows (Automatic Configuration)
- VPN - Windows 10 (Manual Configuration)
- VPN - Windows 10 (FEUP Manual Configuration: SSL Check Point Capsule)
- VPN - Windows 10 and 11 (Manual Configuration ICBAS and FFUP: SSL Check Point Endpoint)
- VPN - Windows 7 (Manual Configuration)
- VPN - Ubuntu (Manual Configuration)
- VPN - Ubuntu (FEUP Manual Configuration: PPTP)
- Wi-Fi
-
Information System
- Accessing your personal page
- Accessing Course Unit Fact Sheets
- Updating Personal Data
- Authentication (Login)
- Configuring your personal data
- Confirm Personal Data
- Viewing your current account
- Viewing your timetable
- Viewing your academic path
- Consulting Periods of Limitation
- Creating a multipurpose declaration
- Insert/Change Photo
- Integration of Course Units with Moodle and Microsoft Teams
- Requesting a certificate
- Requesting a digital certificate
- Requesting a [email protected] Pass
- Software
- Documentation and Information Resources
-
Cyber Security
- Report Incident
-
Computer Security and Privacy
- Antivirus
- IT Security Audit
- Client Digital Certificates - Sign Email Messages
- Client Digital Certificates - Digital Signing of Documents (Non-Qualified Digital Signature)
- Client Digital Certificates - Install
- Client Digital Certificates - Obtaining a Certificate
- Client Digital Certificates - Revocation
- Digital Certificates for Servers
- Policies and Good Practices
- Data Protection
- Tutorials
- Help and Support
- Contacts
In other words, we should avoid taking certain baits, no matter how appetising they may seem. If we give in to curiosity, we could be the perfect victims of a typical attack in these seas: "phishing".
The name gives away the danger: "phishing" comes from the English word for "fishing" and happens when cybercriminals try to do just that: "fish" for confidential information, such as bank details or passwords, for example. Of course, these scams have negative consequences, but there are ways to be aware of them and avoid the wrong hooks. We should adopt six behaviours to avoid falling prey to these invaders.
Six useful tips
Always be wary
Email is one of the most popular places for phishing, but there are other ways in which attacks can take place: Phone calls, SMS, WhatsApp, Facebook and other networks. Whichever application you use, always be wary of messages and check that the sender's addresses are reliable - without ever opening any links or attachments. Also, remember that a trustworthy institution never requests personal data in these ways.
Use password managers
Using a secure password is fundamental to strengthening your online security. Filling in a login form automatically is a good help, but you can go further with so-called "password managers". This software allows you to create ultra-secure and different passwords for each website you use. Don't worry: you won't need to resort to memory. The tools save passwords so you can retrieve them whenever you want.
Search for errors
In most cases, those responsible for phishing attacks try to lend credibility to the messages they send by using the visual identity of trusted institutions. But, as a rule, these hackers become victims of their ingenuity. Look for errors in the visual appearance and texts you receive: misaligned items, poor-quality images, spelling or grammar mistakes, or missing elements such as signatures. These elements give the attackers away. You know the next step: report and delete the message.
Validate links
We want to point out that we're not recommending that you enter the link - that would be putting your foot in the trap. There is a trick that will help you know if you're looking at a trustworthy address. And it's straightforward: hover your cursor over the link - again, without clicking - and see the "real" link. If it's suspicious, delete the message immediately.
Resisting threats and easy advantages
Cybercrime is often committed with a certain amount of emotional pressure attached. To get people to do what they want, attackers create messages that arouse a sense of urgency or an unmissable opportunity. So always be suspicious and resist threats of missing payments, for example, or offers that are too enticing. It's a scam.
Use antivirus
This is an additional barrier to cyber-attacks. Although it doesn't guarantee total immunity, using antivirus, anti-spyware, and firewall programs will ensure excellent protection for the devices you use in your day-to-day life, especially your computer.
Remember!
Phishing is a recurring phenomenon that is difficult to eliminate completely. But you can prevent it and learn to recognise when you're facing an online threat. Follow our tips and you'll succeed.