Best Practices

Identity Theft

One of the main motives of cybersecurity attacks is identity theft. Identity theft is the deliberate use of someone else’s identity, usually to use credit.

Phishing emails are commonly used to scam account information or install malware that sends information from your device. Be careful what links you click on.

Identity theft doesn’t just happen online. Discarded bank statements, bills, receipts, and old hard drives are also used by identity thieves.

Phishing

Phishing

Phishing is a form of social engineering where the attacker attempts to trick people into revealing private information by sending fake emails that appear to be from reputable sources.

Identifying a Phishing Email

Here are a few things to look for when trying to figure out if an email is a phishing attack:

Digital Self-Defense Training

DSD LogoDSD Dojo for Development and Alumni Relations

https://www.rit.edu/security/dsddojo/

The Information Security Office provides Digital Self Defense training courses scheduled through the Center for Professional Development or by request. The program is divided into three courses: Introduction, Desktop Security Tools, and Information Handling. See below for more information about specific courses.