Online Security
Email and online security — staff guidance
Practical guidelines to help you recognise threats, protect your account, and keep WEA's communications and data safe.
1. What is phishing?
Phishing is when an attacker sends a deceptive email designed to trick you into clicking a malicious link, downloading malware, or handing over login credentials or sensitive information.
Attackers often impersonate people in authority — senior leaders, IT staff, or well-known organisations — because it makes the email feel legitimate and urgent. At WEA, we are particularly at risk of emails impersonating the Secretary General or other senior figures, since many staff are accustomed to responding quickly to requests from leadership.
Modern phishing emails can be extremely convincing. They may display the correct name, profile photo, and even use language that sounds familiar. The display name is not proof of identity — only the underlying email address is, and that too can sometimes be spoofed.
2. How to spot a phishing email
No single sign is definitive, but the following are common warning indicators:
False urgency
Pressure to act immediately
"Respond now," "This is confidential," "Do not forward." Urgency is a manipulation tactic.
Wrong sender address
Slightly off email address
E.g. [email protected] instead of [email protected]. Always check the actual address, not the display name.
Unusual request
Out-of-character ask
Requests for gift cards, wire transfers, passwords, or sensitive data — even from a known name.
Suspicious links
URLs that don't match
Hover over any link before clicking. If the URL shown doesn't match where it claims to go, do not click.
Poor quality
Grammar or tone issues
Unusual phrasing, spelling errors, or a tone that doesn't match the person it claims to be from.
Unexpected attachments
Files you didn't ask for
Particularly .zip, .exe, .docm files or PDFs from unknown senders. Do not open without verifying.
3. If an email lands in your spam folder — stop
Your email system filters messages for a reason. If an email has been marked as spam, treat it as suspicious by default — even if the sender appears to be a colleague or senior leader.
DO NOT
-
Click on any link or button within it
-
Open any attachments
-
Reply to the email
-
Move it to your inbox without verifying
-
Assume the spam filter made a mistake
INSTEAD
-
Contact the apparent sender via WhatsApp or phone to ask if they sent it.
-
Forward it to James for review before taking any action
-
Report it as phishing in Gmail (three-dot menu → "Report phishing")
-
Delete it if confirmed as spam
4. What to do if you receive a suspicious email
Follow these steps if you are unsure whether an email is genuine:
5. Protecting your account
Your Google Workspace account is your primary gateway to WEA's data, documents, and communications. Protecting it is essential.
-
Use a strong, unique password. Do not reuse a password from another service. A strong password is long (14+ characters), uses a mix of types, and is not based on personal information. You can use a Password Generator such as this one: https://www.mapletech.co.uk/tools/password-generator/. Ensure that you tick the 'Include Symbols' and 'Include Numbers' checkboxes.
-
Enable two-factor authentication (2FA). This is one of the most effective protections available. Even if your password is compromised, 2FA prevents an attacker from accessing your account. Set this up at myaccount.google.com.
-
Never share your password. Not with colleagues, not with IT support. Legitimate IT support will never ask for your password.
-
Do not use your WEA password anywhere else. If another site you use is breached, attackers will try that password on your work accounts.
-
Log out when finished on shared computers. Never leave a session open on a device you share with others.
-
Be cautious about third-party apps. Do not authorise third-party apps or browser extensions to access your Google account unless you are confident they are legitimate and necessary.
6. Safe use of devices
Many staff access WEA email and documents on personal phones and laptops. If you do so, these principles apply:
-
Keep your device up to date. Software updates regularly include critical security patches. Delaying them leaves known vulnerabilities open.
-
Use a screen lock. Set a PIN, password or biometric lock on any device that has access to WEA systems.
-
Be careful on public Wi-Fi. Avoid accessing WEA accounts on unsecured public networks. If necessary, use a VPN.
-
Do not install software from untrusted sources. Only install apps and extensions from official app stores or trusted developers.
-
Report a lost or stolen device immediately. If a device with WEA access is lost or stolen, contact James immediately so that remote access can be revoked.
7. Sharing files and sensitive information
WEA handles sensitive information — staff details, financial data, partner communications, and data from members in restricted regions. Handle all such information with care.
-
Share Google Drive files via the built-in sharing feature rather than sending files as email attachments. This gives you control over access and allows you to revoke it later.
-
Verify requests before sharing sensitive data. If you receive an unusual request to forward a document or provide information — even from a colleague — verify it via a separate channel first.
-
Do not email sensitive data to personal addresses. If you need to share something with a colleague, use their WEA email address, not a personal Gmail or Hotmail account.
-
Do not store WEA data on personal cloud storage (personal Google Drive, Dropbox, iCloud, etc.). Use WEA's Google Workspace Drive only.
-
Be especially careful with data from sensitive regions. Information about colleagues, partners, or church leaders in countries where Christianity is restricted must be handled with extra care. When in doubt, ask James or Peirong before sharing.
8. If something goes wrong
If you believe you have clicked on a phishing link, entered your credentials on a suspicious page, or otherwise compromised your account — act immediately. Do not wait, and do not be embarrassed. Early action can prevent serious harm.
James Burden — Web and IT Manager
For all IT security concerns, including suspected phishing, account compromise, or lost devices.
WhatsApp / Phone: +44 7506 789420
Email: [email protected] / [email protected]