Phishing and Email Security
Cyber criminals tend to focus on email communication at the workplace on account of its wide distribution. However, email security doesn't only involve preventing possibly harmful or unwanted incoming emails, but also protecting one's outgoing emails, especially if sensitive information is included. The terms spam and phishing are often used in the context of harmful and unwanted emails.
But beware: cyber attacks or unwanted messages can also be sent through other communication channels besides email. That's why it's important to be equally vigilant if you receive unusual communications when using messengers, social networks or even the telephone.
Spam
Spam is the general term for unwanted messages, usually sent in mass quantities. The name comes from Hormel’s tinned meat product “SPAM”, made famous by the Monty Python sketch and is synonymous for “unwanted things in abundance”. Although spam messages can be distributed in a variety of ways, such as by fax or SMS, most people think of spam as emails. The originators, also called "spammers", of such messages send them automatically. Most often, such messages are used for advertising purposes, fraud attempts, distribution of malware or phishing.
For advertising purposes or fraud attempts, "fantastic" and "unbelievable" products, e.g. novel diet pills or get-rich-quick schemes, are often promoted. A lot of great promises are made in order to persuade the recipient to take up the offer. As a rule, however, such products and offers do not deliver what they promise or are non-existent and the money paid is lost forever.
Phishing
Phishing is the term used to describe emails or websites that have been prepared by criminals and are designed to obtain information for the purpose of identity fraud. Often, these are emails that pretend to come from well-known companies, e.g. banks or the University of Münster, and can look convincingly genuine. In most cases, they refer to an urgent problem (threat to delete the account, request to change the password etc.) and demand immediate action from the user. This is just an excuse to make panicked users visit a linked website or run a malicious file that is attached to it.
The linked websites are often designed in the same way as the original company websites, and the address line of the browser usually shows an address that looks deceptively similar to the real one, e.g. http://www.uni-meunster.de instead of http://www.uni-muenster.de. Sometimes, in addition to supposed "security checks" or "updates", the user is asked to enter personal data to verify their ID, such as an address or credit card number. If you fall for this ruse, your information is forwarded to the criminals who misuse it for their own purposes or sell it.