Incidents
EMC S.A. has a department in its structure responsible for maintaining IT systems and ensuring the security of their use. If you have noticed that the system is not working properly and its use carries a potential threat, report this fact to us.
What should be reported?
- events associated with the IT infrastructure of the EMC Group: IT attacks originating from IP addresses belonging to Group entities;
- attempts at online fraud and scams using the EMC image, e.g. fake websites;
- e-mails impersonating EMC Group entities;
- unavailability of websites and online services
- vulnerabilities and other events that have an adverse effect on security,
How to report security incidents? Please send reports to the following address: incydent@emc-sa.pl. E-mails should include the contact details of the reporting party and a detailed description of the incident.
What is an Email Scam?
A scam is a malicious e-mail message that aims to persuade recipients to provide confidential information, such as a login and password, or directly demands a ransom under a fake pretext. This is one of the ways that scammers use to get money from you.
The most common types of unwanted messages:
SPAM: Mass mailing of unwanted messages to many recipients
Phishing: A fraud method in which a criminal impersonates another person or institution in order to extort confidential information, infect a computer with malware, or persuade the victim to take certain actions
How to recognize Spam
Here you will find a few ways to recognize spam messages
- Unknown sender. If you do not know the sender of the message, this is the first sign to be careful about the content of the message.
- Virus warning. This may indicate a fraud attempt. Do not click on links or open attachments.
- An extremely unlikely promise. Content suggesting a lottery win or other easy-to-achieve benefits offered by an unknown sender.
- Attachments. Never open attachments from an unknown sender.
- Urgent offer. Creating an atmosphere of haste and urgency is intended to lull vigilance.
- Lack of connection between the subject and the content. The content of the message does not refer to its subject
How to protect yourself?
Below are a few ways to avoid being manipulated by a fraudster:
- only give your email address to trusted partners.
- react immediately to unsolicited mail – requesting the deletion of your address
- do not open attachments in e-mails from unknown senders.
How to recognize Phishing
Below are a few simple ways to recognize a message with a fraud attempt.
- Unofficial domain in the email. The message comes from an address that resembles a real one, but is not, e.g. fraudster[@]emc-sa.eu
- Bad domain of the website. The message contains a link to a domain that looks like the real emc-sạ.pl website, but the letter “ạ” has a different encoding and a tiny dot underneath
- Typos, unnatural-sounding words. The message contains incorrect grammar, punctuation, and spelling mistakes.
- Using fear tactics. Sending false payment demands with a threat to initiate debt collection proceedings.
- Virus warning. Messages from the antivirus system after opening the message.
- Attachments. Never open attachments from an unknown sender.
How to protect yourself?
Below are a few simple ways to recognize a fraudulent message.
- Protect your accounts by securing them with two-factor authentication.
- Think before you click anything in a pop-up window on your computer screen.
- Always verify the sender of an email before clicking on its content or opening an attachment.
- Try to verify information in messages through another contact channel.
- Try to verify information in messages through another contact channel.
- Do not provide your personal data if you are not sure that you are talking to someone you trust. Do not send photos or scans of the following documents: ID card, passport, credit card (e.g. for the purpose of making a payment when buying through an advertising portal).
Remember, an EMC employee will never ask you to provide logins/passwords to bank accounts, e-mail, social media or any other sites. If you encounter a request to disclose your login details, report this fact to the e-mail address provided here
