Scams target people of all ages, income levels, cultures, and backgrounds. There is no one type of person that is more likely to be a victim of a scam than another. Learn how to protect yourself and be alert to scams.
Phishing is a constant threat to any organization and now with the threat of Ransomware looming it is very important that one get familiarized with some common threats, terminology, and new technology risks. To help you identify them you can review the following topics to learn how to protect yourself.
Internet of Things (IoT)
Technology continues to amaze us with new "smart" devices. However, these devices still have issues with security, and it is important that you review any new device to see what you should do to prevent the loss of control and/or privacy.
Social Engineering is a method of manipulation used to have someone perform an action that can compromise security or obtain confidential information from someone by phone, email, or in-person.
Identity theft occurs when someone uses your personally identifying information (PII), like your name, Social Security number, or credit card number, without your permission, to commit fraud or other crimes.
Malware, short for malicious software, is software that is coded with malicious code for illegal intent. This malicious code can be anything from a virus, worms, trojan horse, and Spyware.
Phishing is probably the most common form of social engineering we see at the University. By using fraudulent websites and false emails, perpetrators attempt to steal as much information as you are willing to give them.
Ransomware can lock and/or encrypt all files located on the system(s) or connected network shares. Users are often extorted for money via an on-screen alert.
Scamware is software that poses as legitimate but is really nothing more than malware waiting to wreak havoc. Some of this scamware is even advertised on TV, so it does look legitimate, but it has no real worth at all.
Scareware is a tactic that involves popups of web pages claiming that you are infected, have malware, spyware, or other issues with your computer that require immediate resolution.