Category : security

This Valentine’s week, love is in the air, and so is the potential for online threats. Just as Cupid aims his arrow, cybercriminals are ready to strike with phishing attacks, putting your heart and personal information at risk. This Valentine's, let's explore the dangers of phishing and how you can protect your personally identifiable information. 

 

Love-Struck by Phishing: Phishing scams are like digital love letters from deceitful suitors. They come in various forms—fraudulent emails, fake websites, and social engineering tactics. Just as you'd be cautious with matters of the heart, exercise caution online. Here are some different types of phishing scams that cybercriminals may try to use to woo you: 

 

  • Email Phishing - Email phishing is the most common form of phishing. Attackers send deceptive emails, often impersonating trusted entities such as banks, companies, or government agencies. These emails typically contain urgent requests for personal information, login credentials, or financial details. Be cautious of unexpected emails, verify the sender's authenticity, and avoid clicking on suspicious links or downloading attachments. 
  • Spear Phishing – Unlike the broad ‘shotgun’ approach phishing typically employs, spear phishing is a targeted form of phishing that focuses on specific individuals or organizations. Attackers tailor their messages to appear more personalized, often using publicly available information or leveraging social engineering techniques. Spear phishing emails may reference personal details or colleagues to appear legitimate. Stay vigilant, question unexpected requests, and independently verify any suspicious communication. 
  • Smishing - Smishing, or SMS phishing, involves phishing attacks conducted through text messages. Attackers send deceptive texts containing links or prompts to respond with sensitive information. These messages may appear as urgent notifications or prize announcements. Exercise caution when receiving unsolicited texts, avoid clicking on links, and verify the authenticity of any requests. 
  • Vishing - Vishing, or voice phishing, occurs when attackers make phone calls posing as legitimate entities, such as banks or tech support. They attempt to deceive victims into revealing sensitive information or providing access to their devices. Remember that most organizations will never request your password over the phone. Be skeptical of unsolicited calls and avoid sharing personal or financial details. 
  • Pharming - Pharming involves redirecting users to fraudulent websites without their knowledge. Attackers manipulate DNS settings or exploit vulnerabilities to redirect users to malicious sites that mimic legitimate ones. These fake websites aim to collect personal information or install malware. Always verify the website's URL and be cautious of websites requesting sensitive information. 

 

Roses are Red, Violets are Blue, Be Wary of Links, and So Should You: Just as you wouldn’t blindly follow a stranger's lead, avoid clicking on suspicious links. Phishers often use enticing links to lead you into a trap. Make sure you check the destination of any link by hovering your mouse over it to see the URL. If the URL does not lead where it is supposed to, it may be a phishing attack.  

 

Guarding Your Heart (and Personal Information): Just as you guard your heart in matters of love, protect your information from falling into the wrong hands. Cybercriminals target personal information to commit identity theft or fraud. Here are some ways you can protect yourself: 

 

  • Secure Online Dating: If you're exploring online dating, be cautious about sharing too much information too soon. Trust is earned over time, both in love and in digital interactions. 
  • Limit Social Media Sharing: While sharing your life on social media is common, be mindful of the information you make public. Avoid sharing sensitive details that could be exploited. 
  • Two-Factor Authentication: Enable two-factor authentication (2FA) wherever possible. 2FA adds an extra layer of security, ensuring that even if your password is compromised, your accounts remain protected. 
  • Reporting Digital Cupids: If you encounter a phishing attempt, report it. Phishing attempts can be reported by utilizing the phish report function in outlook. By reporting, you contribute to the community's safety. 

 

This Valentine's week, let love be in the air, not the deceit of digital cupids. Stay vigilant, guard your heart and personal information, and remember that a little caution online can go a long way in ensuring a love-filled and secure digital experience. 

 

Wishing you a Happy and Secure Valentine's Day! 

 

--WU ITS Information Security   

www.washburn.edu/cybersecurity 

 


Archives

2024 2023 2022

Available Blogs

 security
 cascade
 D2L
 resourcespace