Skip to Main

Updates

Watch out for scams asking for favors

 

Beware of anyone asking you to buy gift cards. A scammer, usually posing as a person of authority or familiarity, will send an email or text requesting a favor.

Tricky trivia

 

Personality tests, polls, and surveys on social media can contribute to impersonation and identity theft.

Avoid phony customer service contacts

 

Scammers publish fake customer service phone numbers on the internet for well-known businesses.

Look out for IRS phishing scams this tax season

 

The Internal Revenue Service (IRS) has warned of ongoing scams. Malicious links in emails or text messages are designed to trick recipients into sharing Social Security numbers, driver’s license numbers, or other personal information that could be used in identity theft or to file fraudulent tax claims.

Did you get hooked?

 

A realistic looking phishing email was sent to employees and staff for the purpose of strengthening UTSW security awareness and response.

Avoid geographical cyber-targeting

 

Geo-targeted phishing occurs when cybercriminals execute customized attacks based on your geographic location.

Do you know how to spot a travel scam?

 

Keep security top of mind when you are planning to travel.

Look out for holiday cyberscams

 

The holidays are very appealing to hackers, which lead to an uptick in phishing and ransomware attacks.

Cyber Paranoid or Prepared?

 

Are you paranoid or are cybercriminals out to get you? Scammers pivot to a new strategy when the old methods no longer work. Be prepared and you have nothing to fear.

Enable security features like multifactor authentication to secure your personal accounts

 

Recently, a well-known technology company experienced a network security breach initiated through an employee’s personal Google account. The employee enabled password syncing via Google Chrome and saved their work credentials in their browser – synchronizing their work and personal passwords. The attackers compromised the personal account, and multiple corporate systems were accessed.