Common Phishing Scams
Information Security has seen attacks where individuals are misled to believe they have been chosen for a job opportunity with the university or outside the university. The attacker then either directs the individual to fill out a website with personal information or ask for information through correspondence.
Is an attack where a malicious actor reaches out to request assistance then asks for the victim to purchase gift cards, take pictures of the back of the cards, and send them to the attacker.
For more information about avoiding phishing scams see the following website: FTC Consumer Information - Avoiding and Reporting Scams
Free Antivirus Software
Free antivirus software is available to students, faculty, and staff with a valid EUID.
Security Tips for Students
- Never provide your password to anyone. University helpdesk and support groups will never ask you to for your password. Neither should anyone else.
- Have a unique password for all sites, especially financial or banking applications or websites.
- Use two-factor or multi-factor authentication when available.
- Ensure that the length of your password is at least 12-15 characters long. Consider a passphrase, a password made from a long sentence.
- Ensure all operating system and third-party software is up-to-date, these updates may correct vulnerabilities.
- Enable the system firewall.
- Be cautious when using public Wi-Fi networks.
- Do not enter or access sensitive information.
- When connecting to the university network from a public or insecure Wi-Fi network
use the VPN.
- Instructions for VPN access.
Phishing is the most common type of malicious attack. It can be conducted using any form of communication.
- Phishing is an attack done over email
- Vishing is an attack done over the phone
- Smishing is an attack done over SMS (text) messages
Information Security provides information on common attributes of phishing emails and how to detect malicious links.
You can find more information about phishing attacks in the following places:
Information Security: Is Your Computer Secure?
Google: How to know if an email is real
LinkedIn Learning: Recognizing Phishing Emails
LinkedIn Learning: Internet Safety for Students
For information on how to access LinkedIn Learning through the university.