This page uses javascript to help render elements, if you have problems please enable javascript.
 
You are now inside the main content area
 
 
 
left col

Malware and Phishing

The Division of Information Technology (IT) continues to make improvements to security, however, the best defense against these attacks is knowing how to spot and report them. 

right col
 
 
left col

IT Training Resources

Browse the list of Spear Phishing Resources to learn how to protect your information and property.

right col
 
left col

Protection is detection, know how to spot a lure

Spear Phishing

Similar to a phishing email, spear phishing messages are typically more personalized, making it appear that they are from a person or organization that you know.  Its ability to appear authentic and logical makes it more successful.  Everyone with an email address is a potential target.   

PhishMe and IT awareness programs

IT and a partnership with PhishMe launched an awareness program to help employees learn about the dangers of email fraud, specifically, email spear-phishing.  Scenarios are developed collaboratively and used for educational purposes. 

Focused on spear phishing attacks in the work place, PhishMe sends out simulated phishing emails that mimic real ones.  If you get “reeled in” or “hooked” by a simulated phishing email, a training module will be presented to you.  This provides training for recognizing phishing email attempts and how to avoid becoming a victim in the future.  The tips are applicable to home use to help you protect yourself from identity theft and help you to protect your financial account information.  

right col
 
left col
right col
 
left col

Understanding Vulnerabilities

Phishing IQ

Have you ever wonder how many of the emails you receive are phishing emails?

You may have realized that many times the fake lottery ticket, or an email from IRS is fake - a phishing e-mail. Test your self with the IQ test from the creators of the Sonicwall firewalls (DeLL).

How is your Phishing IQ?

Virus

A computer virus is a small piece of code written to alter the way a computer operates, without the permission or knowledge of the user.

A computer virus must meet two criteria:

It must execute itself.

It must replicate itself.

Computer Virus?

Worm

Worms are programs that replicate themselves from system to system without the use of a host file. 

Worms generally exist inside of other files, often documents. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm.

Trojan Horse

Trojan horses are impostors--files that claim to be something desirable but, in fact, are malicious. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in effect, invite these programs onto your computers by opening an email attachment.

Trojan Horse?

Apple Syndrome

Perhaps, one of the biggest complacency risks out there is the “Apple syndrome” - as in, “I’m not at risk of malware because I use a Mac.”

Many users believe that their Apple device is immune to the viruses; however, this is a myth.

Although the number if viruses targeting a mac operating system platform is fewer than PC platform, macs also get viruses and they can get damaged.

Ransomware

For the past few years a trend overtook the business market - ransomware attacks. They have taken place more often because employers failed to educate and train their employees.

In these attacks a malicious piece of software, sent by a criminal, takes over your files and encrypts those with a secret key. Afterwards it displays a message asking for most common cryptocurrency to give you back your files.

Ransomware Prevention

Attacks

Many users do not consider themselves as a high target. however ransomware can sit on your device for a long time and the get activated at work when you take your own device to work.

Even if you connected to a wireless network, the ransomware can use your network connection and spread across the network.

Live Security Attacks

right col