Last week we published part two of this four-part article by looking at phishing by phone calls. This week we look at phishing by social media.
3) Social media. Of the three types of phishing discussed here, phishing in social media is by far the most dangerous because unlike emails and phone calls, the interactivity between people on social media lead many people to let their guard down. There is a false sense of intimacy and trust. After all, on platforms such as Facebook, you are only friends with your friends and you only like pages you trust. But don't forget: in order to find
Last week we started this four-part article on phishing by looking at phishing by email. This week we look at phishing by phone calls.
2) Phone calls. Phone calls can be a bit tricky; but overall, there are just a couple of things you need to look out for to avoiding getting hooked by a scammer on the phone. First, in general, you should only answer phone numbers you recognize and trust. However, if for some reason you do decide to answer an unknown number, keep your guard up and listen carefully to what the person on the other side of the line is saying. Typically, if it is a scam
Phishing, as defined by Merriam-Webster, is a scam by which a user is duped into revealing personal or confidential information which the scammer can use illicitly. Phishing can happen anytime and on any media including but not limited to email, phone calls, and social media. The articles over the next four weeks detail what to look out for when using your favorite devices; and if you have been a victim of a scam, what to do to stop the attack.
1) Email. No matter who you are, you will undoubtedly receive plenty of spam mail; and generally, it is easy to recognize spam
In January, CNS kicked off the college-wide Disaster Recovery Planning Project. I've had the pleasure of heading up this project along with our Project Manager Elizabeth Castillo.
While spearheaded by the CNS Office of Information Technology (CNS OIT), the project seeks to bring in all departments within CNS this year, along with various Dean's Office units. Next year, we hope to bring in some of the other business units, centers, institutes, and research labs as well. To accomplish this, we've asked each department to assign a "Point of Contact" (POC) for