Slideshow image

Scammers are sending emails from someone claiming to be Bishop Halaas. Remember, no one from the synod staff will ever send an email asking you to send gift cards, perform "some tasks" or vaguely ask you for a "favor."

The
 Synod staff is constantly balancing the needs of a public church to openly share information and  protect your privacy. So, we ask you to please follow these cyber safety guidelines:

  1. Always check the sender's email address. You can usually do this by hovering over the sender's  name (without clicking on the address). Emails from the Bishop will always come from              her @wisynod.org email.
  2. Delete any suspicious emails. Do not reply to them. Several of the scammers ask for gift cards or money in a second follow-up email, after an initial vague request for an immediate favor.
  3. When in doubt, don't reply or respond. You can always call the office to follow up on an email in  question. If you have doubts, call first.
  4. Don't ever click on any links in a suspicious email.
  5. Never include personal or financial information in an email.
  6. If you don’t change your password regularly, do it today
  7. Avoid posting emails, list of emails, or documents containing emails without protection on websites / social media
  8. Avoid using personal or free Email addresses such as Gmail, Yahoo, etc., these are more vulnerable and easy to fake with look-alikes
  9. Implement two-step verification (e.g. email and phone call) for any financial transactions or wire transfers
  10. Provide security awareness training to staff and rostered leaders.  Here is a link to a webinar that we conducted in April that may be a good starting place, https://www.elca.org/Resources/Information-Technology#Webinars We also have a good phishing avoidance piece posted on ELCA.org.
  11. Implement defensive security and email controls
  12. Report to Law Environment: Provide details of attacks to FBI, they may correlate any small cases with larger cases.  Here is the link:  https://www.ic3.gov/default.aspx​.