Phishing

Safe Social Networking and Blogging

Social networks are great. They do present some security challenges and risks, however.

This guide describes the dangers you face as a user of these websites, and provides tips on the safe use of social networking and blogging services.

Dangers of Social Networking

Many computer criminals uses these sites to distribute viruses and malware, to find private information people have posted publicly, and to find targets for phishing/social engineering schemes. Below is a short list of users who may be using... ...

Phishing

Phishing is a form of social engineering where the attacker attempts to trick people into revealing private information by sending spoofed e-mails that appear to be from reputable companies. Phishing e-mails provide a link to a seemingly authentic page where you can login and reveal your username, password and other personal identifying information (PII)." Online scammers can then use this information to access your accounts, gather additional private information about you, and make purchases or apply for credit in your name.

General protection against phishing scams 

Safe practices

  • NEVER RESPOND TO
  • ... ...

Ransomware

Ransomware Screen

What is Ransomware?

Ransomware is a type of malicious software that encrypts your files. Often, the only way to decrypt and gain access to the files is by paying a “ransom” or fee to the attackers. The attackers might provide the decryption key allowing you to regain access to your files. Ransomware may spread to any network shares/drives to which you’re connected. We are continuing to see ransomware attacks and expect their frequency to increase.

How can I get infected with Ransomware?

Common vectors for Ransomware attacks include emails with malicious attachments... ...

The Danger of Phishing Emails and How to Detect Them

Phishing is designed to lure you into clicking on a malicious link or giving up personal information. The creator of these types of emails can disguise the address of the sender to make it look like the email is coming from a reliable source, use information from your social media accounts to make it more personalized, and choose a subject line for the email based on current events, or something that applies specifically to you. The goal for the attacker is to make these emails look as convincing as possible so the reader will click on any attached links without... ...

Online Safety

Online Safety

Everyone connected to the Internet is a potential target. Use of anti-virus and firewall software is critical in protecting your computer online; however, simply protecting your computer is not enough. 

Web Browsers

Cyber criminals often target vulnerabilities in web browsers. Because Internet Explorer was a web browser used by most people, it quickly became a primary target. Using a different browser can reduce your risk while on the web. The table below lists alternative browsers:

... ...

Browser