What can we help you find?

GO

Newsletter

Protect Your Personal Information from Cyber Criminals

Posted on Monday, March 25, 2019

Protect your information from cyber criminals

Cyber criminals may try to pose as Cedar Falls Utilities to gain access to your personal information.

When cyber criminals attempt to trick you into divulging personal information by sending you a fake email posing as a legitimate business or friend it is known as phishing.

During a phishing attack, the criminal will pose as Cedar Falls Utilities and ask you to confirm personal information or ask you to open a malicious attachment that infects your computer with a virus or malware.

CFU will never ask you to provide personal information in an email. If an email appearing to be from CFU requests personal information, it is fraudulent and should be deleted.

Avoid falling victim to a phishing attempt. Watch out for emails that do the following.

Asks you to confirm personal information - legitimate companies will not ask for your personal information in an email

Uses a fake email address - sender is not a cfunet.net or cfu.net email address, but may use a variation such as cfu.net.servicemail

Entices you to click - directs you to click on phony links that take you to infected web sites

Contains spelling and grammatical errors - the verbiage may not make sense or includes glaring errors

Includes suspicious attachments - if you aren’t expecting an attachment, don’t open it

Elicits panic - these emails are designed to make you act quickly and include threats if you don’t follow their instruction

Cyber criminals go to great lengths to make these fraudulent emails look legitimate. When in doubt, do not click any links or provide any information. Call the company at a known phone number (not one provided within the email) to verify the email’s authenticity.

If you have questions about an email from Cedar Falls Utilities, call the help desk at 319-268-5221.


Phishing attempt posing as CFU

Cyber criminals target your personal information by posing as legitimate businesses in a technique known as phishing.

Here is an example of a phishing attempt from a cyber criminal posing as CFU. Red flags to alert you include:

email is not from a CFU.net email address

the logo is not used correctly

grammatical errors​