Even the best spam filter misses an occasional scam. However, if you can spot the difference between official and fake, you become the BEST defense in keeping your data safe and the ECU network secure. Official messages from ITCS always include how to corroborate official announcement on the ITCS website.
|Everyone wants to exercise best practices and stay safe while online, though doing so is often easier said than done. For most, convenience outweighs security and as a result, we put ourselves and others at risk for identity theft and other cyber threats. In keeping with the shared responsibility theme for National Cyber Security Awareness Month, we wanted to bring you an opportunity to not only hear about the typical dangers and pitfalls that come with being online, but more importantly, for you to know which ones (as an individual), you are most susceptible to.
One of the National Cyber Security Alliances’ partners (EMC2/RSA) has kindly provided an “Online Identity Risk Calculator” quiz, to help you find out your personal identity risk score and based on that – they will provide practical tips on how you can keep your online identity protected.Just answer 10 questions and discover how your online activities – from banking and shopping to the types of social networking sites you visit – may potentially make you more vulnerable to identity theft and fraud. Click HERE to play! – IDENTITY RISK GAME
Are you unwittingly putting ECU at risk?…Now that we have looked at our personal habits and the potential consequences of such, we wanted to give everyone a chance to take a similar evaluation to determine if and how their behavior differs while at work.
Just answer 12 questions to calculate your workplace security risk score. Discover how behaviors like sharing passwords, or using your work computer to check personal emails or download music could make the university vulnerable to hacking, malware and other attacks. Click HERE to play! – WORKPLACE SECURITY GAME
Did your online risk score(s) surprise you? Did you think that you were being more careful than you really are? Are you practicing safer habits at home than you are at work or vice-versa? – If so, why?
We would love to hear feedback from staff and faculty across campus to help us understand and target the areas of concern. Please post to this blog, our Technology Digest blog or our ITCS Facebook page with your results and/or comments!
ITCS on Facebook: https://www.facebook.com/ITCSatECU
ECU Technology Digest blog: http://blog.ecu.edu/sites/techdigest
Phishing is a method by which someone tries to lure you into revealing your valuable personal information, such as an account password or credit card number. The intent of this type of scam is to gain access to your user accounts or money—something we all want to avoid.
The problem we face today is that phishing scams are becoming more and more convincing. They look like authentic communications from people and organizations that we know and trust. No longer can we depend on finding misspelled words in a hastily written email or obvious mistakes on a fake website to know that something is amiss.
Phishing attacks are being carried out with far greater attention to detail. Emails and websites look surprisingly authentic, easily fooling the casual observer. But how can we tell the difference?
Fortunately, most phishing scams have some telltale signs that will give them away. Here’s what to look for and what to do:
- BE WARY of any request for your password, account number or other personal information, especially if the request is urgent and a web link is given for you to submit your information. This is the key signature of a phishing scam.
- DO NOT click on the imbedded link, even if you are curious. Sometimes, these links will take you to a fake website to harvest your information and sometimes they will infect your computer with malware.
- DO check with your trusted source (e.g., your bank, online retailer, IT department) to determine if the request is legitimate. Be sure to open a new browser window and type in the home address and navigate from there. Or simply give them a call on the phone.
For more information see Don’t be “Phooled” by Phishing Scams at http://www.ecu.edu/cs-itcs/itsecurity/Phishing-Scams.cfm.