Cybersecurity Awareness

Preventing Social Engineering Attacks

August 18, 2020
Social Engineering criminals focus their attention at attacking people as opposed to infrastructure. Social engineering begins with research; an attacker may look for publicly available information that they can use against you. These attacks can come in a variety of formats: email, voicemail, SMS messages, DMs, or via social media and attempt to prey on your respect for authority, courtesy, or trust.

Why Reusing Passwords is a Bad Idea

April 16, 2021

"I have a really great passphrase, it's long and easy to remember, so I use it on all my accounts."

Sound familiar? Why is it so hard for us to abandon this idea that reusing passphrases is a bad idea? Well, we're humans and humans tend to rationalize to confirm our decisions. "What are the chances that someone will get my password and compromise my account, I mean, will that really happen to me?" Well, it turns out it does - and more frequently that you might imagine.

According to...

Cybersecurity Videos

Security is a shared responsibility. We all have a part to play.

Too busy to read our articles? Here are three, short videos to give you some tools to help you protect your data.

Scammers are Exploiting Coronavirus Fears to Phish Users

March 9, 2020
Attackers have been sending emails that feed on concerns about COVID-19 to spread malware, trick them into sharing account credentials, or opening malicious attachments.

Traffic Light Protocol

Overview

The Traffic Light Protocol (TLP) was created to facilitate greater sharing of information. TLP is a set of designations used to ensure that sensitive information is shared with appropriate audiences.

TLP uses four colors to define sharing boundaries to be applied by the recipient(s) indicating when and how sensitive information can be shared, and by facilitating more frequent and effective collaboration. TLP is optimized for ease of adoption, human readability and person-to-person sharing; it may be used in automated sharing exchanges...

Ransomware Toolkit

ransomware image

Ransomware is not new; but, it's been popping up more and more in higher ed. Each week brings news of colleges and universities that have fallen victim to ransomware attacks. Some hackers demand payment, while others steal personal data (to sell to identity thieves). Whatever the motives are,...

Ransomware

Learn how to protect yourself from ransomware with these flyers, tips, and videos.

Securing IoT Devices

While many have come to rely on Internet of Things (IoT) devices for added efficiency and convenience, the devices are also entry points cybercriminals can use to violate your security and privacy. According to Symantec’s 2019 Internet Security Threat Report (ISTR 24), “IoT devices experience an average of 5,200 attacks per month. Routers and connected cameras were the main source of IoT attacks accounting for over 90 percent of activity.” Various IoT devices have been exploited: baby monitors; security...