Updates
Social Engineering
Social engineering is a low-tech approach used by scammers to gain access to an organization’s information and resources.
Termed Accounts
Deprovisioning is the process of deleting employee access to information resources when they leave. Supervisors and sponsors, please be sure to follow up when a user leaves UTSW. These unattended accounts could continue to be used by the ex employee or function as an easy starting point for an attacker.
Image-Based Phishing
Images may be used by cyber attackers to perform a phishing attack just like a malicious link or an infected attachment. Clicking an image or graphic included in an email may execute malware, initiate a malicious download, or send you to a website intended to steal your credentials or financial information.
Phishing – Back to Basics
Phishing attacks happen fast! According to Verizon 2024 Data Breach Investigations Report, “The median time to click on a malicious link after the email is opened is 21 seconds, and then it takes only another 28 seconds to enter the data. That leads to a frightening finding: The median time for users to fall for phishing emails is less than 60 seconds.”
Dumpster Diving
Dumpster diving is searching someone’s trash for information that can be used to launch a social engineering and/or computer system attack.
Free Digital Offerings
Are you tempted to install “free” software from the internet? Have you considered the hidden cost you pay for free apps, social media, toolbars, search engines and other digital offerings that look too good to pass up?
World Password Day
May 2, 2024, is World Password Day, with the goal of raising awareness about the importance of good password hygiene.
Shoulder Surfing
Protect your information from thieves lurking in plain sight.
Dual-Purpose Phish
Cyber experts have identified a dual-purpose phishing attack that attempts to harvest user credentials and deliver malware.
Types of Phishing
Phishing is a type of attack that targets individuals through email, text messages, phone calls, and other forms of communication. Be alert to these common types of phishing.