Has this ever happened to you?
Someone figured out (broke) the password to your personal email account, and was then able to access your Facebook and online banking accounts. This criminal was able to post to your Facebook wall, transfer money from your checking account, and send phishing emails to your family and friends all because you used this ONE password for all these accounts.
To be more secure online (and avoid this scenario), use multiple accounts for separate purposes. This helps you easily distinguish what type of business is being conducted in each particular account. You can use one account for communicating with friends and relatives, one for all online and offline financial transactions, one for all notifications and newsletters, and one for spam. It is up to you how many accounts to use and for what purpose(s) to use them. In addition, keep your work and/or student account(s) separate from the rest of these accounts.
With the growing use of social media tools like Facebook, Yammer and YouTube in the workplace as well as in the classroom, check out these best practices and guidelines on how to properly use these tools and to protect yourself as well as the university.
Learn more from this social media guidelines document (pdf) for ECU staff
WARNING! A recent phishing scheme warns victims their mailbox has exceeded its storage limit or quota, and that they will not be able to receive or send new emails until they re-validate. It asks the victim to send their email address, user ID, and password to a site by clicking on a link in the email.
Reminder: ITCS reminds users to avoid email scams, hoaxes and phishing schemes circulating on the Internet by not responding to such emails. Scams purporting to be from East Carolina University, Service Helpdesk, ECU IT, ECU Helpdesk, the Web Master, Webmail, the IRS, Your Financial Institution, etc. are bombarding email mailboxes. Although IronPort blocks the majority of such messages, some scams successfully reach your inbox.
- NEVER provide personal or sensitive information in response to any unsolicited e-mail.
- DO NOT open unsolicited e-mail attachments, no matter how realistic or enticing the message.
- DO NOT click any links within unsolicited email messages.
- If you receive such an email, Just delete it!