Skip to main content

We are working to bring Devices, IT services and applications back as quickly and safely as possible. Some services are unavailable at the moment. Read about how to restore your device safely.

Cyber security tips

Email phishing

Email phishing is a cyber attack, using a disguised email.

These emails may look genuine but are actually cyber attackers trying to access systems to cause damage or for financial gain.

You should be extra vigilant when working with emails and browsing websites.

Text message phishing

Text message phishing is a cyber attack, using a disguised SMS text message.

As with emails, the text message can look genuine but can actually be a cyber attack trying to access systems.

We also tend to click on links in text messages quicker than links in an email so it’s important that you don’t click on links in text messages.

Unfamiliar files on your device or shared drive

After you have restored your computer you need to be watchful of files that you don’t recognise. If there are any files you do not recognise on your shared drive or your device when it is restored, do not open them.

These files may be called:

  • 'Readme' files
  • '.feed' files
  • .FEEDC files

What do I do if files on my computer are still encrypted?

Don’t open the file. We are continuing to work decrypting file share servers. If your files have .FEEDC in their file name, this means that this file share has not been fully decrypted yet.

What do I do if I see a ‘read me’ ransomware notice?

Please disregard. This is a notification only file and the Technology team is aware of these ransomware correspondence files still remaining on the
servers.

Security tips

  • Do you know the sender of the email or text?
  • Were you expecting the email or text - is this a normal form of communication or does something seem unusual?
  • Does the email address display correctly? For example first.second@hse.ie is legitimate but first.second@hse-ie.com is not. Check the email address by hovering your mouse over the ‘from’ address.
  • Does the email or text have a sense of urgency that something is too good to be true?
  • Is there bad grammar and spelling?
  • Is the email or text enticing you to do something urgently, for example, for financial gain or a request for action so you don't lose a service.
  • Does the email or text have links to click on for next steps?
  • Is there an attachment on the email? Make sure the file is a recognised Word, Excel, PDF file that you would usually expect. Never run an .exe file. Be wary of .zip files unless you were expecting them. Never click 'run macros' if prompted to.
  • If in doubt ring the person or company (but don’t use the phone number showing in the email, get the number from a trustworthy source)

Page last reviewed: 31/05/2021
Next review due: 31/05/2024