好色先生

Malware

Malware and听Phishing

The Division of Information Technology (IT) continues to make improvements to security, however, the best defense against these attacks is knowing how to spot and report them.听听 听

Spear Phishing is an email spoofing fraud attempt that targets a specific organization seeking unauthorized access to confidential data.听 While spear phishing is similar to a phishing email, the messages are typically more personalized, making it appear that they are from a person or organization that you are familiar with.听 The success of spear phishing hinges on its ability to appear authentic and how logical the request seems to be. 听Everyone with an email address is a potential target. 听听

Through partnership with the vendor PhishMe, IT launched an awareness program to help employees learn about the dangers of email fraud, specifically, email spear-phishing. Scenarios are developed collaboratively and used for听educational purposes.听 The program is focused on spear phishing attacks in the work place and sends out simulated phishing emails that mimic real ones.听 If you get 鈥渞eeled in鈥 or 鈥渉ooked鈥 by a simulated phishing email, a training module will be presented to you, along with tips on how to recognize phishing email attempts and how to avoid becoming a victim in the future. 听The tips are applicable to home use to help you protect yourself from identity theft and help you to protect your financial account information.听听

DATA BREACHES AND INFORMATION SECURITY RISKS听

Every single person as well as large and multi-national organizations are emphasizing for utilizing the technology and making their life comfortable.听 Large companies and organizations use the Internet听to get closer to their customers, make an online relationship with them, providing more and quick services to the customers.听 The companies also create a profile of the company online and also ask their customers to make their online profile on a company website which might bring more royalty from their customers. Customers who create profiles or any type of account, are more likely to come back to get other services. Therefore, companies can easily compile the profiles of their customers and have targeted marketing directed at their needs.

Customers who have created such a profile, believe that their data will be kept secret, safe, and will not be misplaced or compromised by the company staff or any other type of unauthorized听usage. If there is any lack of trust between their clients and the company, privacy issues will take place, and these issues can create problems for organizations later on and they might face difficulty in maintaining and developing a healthy relationship with their customers.听

Companies who collect data are required by law to keep their data secure. There are three specific concerns regarding听information security and privacy which are identified frequently by the consumers.

  • Unauthorized use of the data by external entities
  • security risks and data breaches
  • lack of penetration testing by the application developers

A survey has concluded results that both privacy invasion and errors has an inverse relationship with the online purchasing behavior; although, it seemed that unauthorized use of the data has little impact. The managerial implications include the selection of channels of communications for greater impact, accurate data handling, and maintenance of permission-based contact with the听users.听

Phishing IQ

Have you ever wonder how many of the emails you receive听are phishing emails?

You听may have realized that many times the fake lottery听ticket, or an email from IRS听听is fake - a phishing e-mail. Test yourself听with the IQ test from the creators听of the Sonicwall firewalls (DeLL).听

Virus

A computer virus is a small piece听of code written to alter the way a computer operates, without the permission or knowledge of the user.

A computer virus must meet two criteria:

It must execute itself.听

It must replicate itself.听

Worm

Worms are programs that replicate themselves from system to system without the use of a host file.听

Worms generally exist inside of other files, often documents. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm.听听

Trojan Horse

Trojan horses are impostors--files that claim to be something desirable but, in fact, are malicious. Trojans contain malicious code, that, when triggered, cause loss, or even theft, of data. In order for a Trojan horse to spread, you must, in effect, invite these programs onto your computers by opening an email attachment.听

Apple Syndrome

Perhaps, one of the biggest complacency risks out there is the 鈥淎pple syndrome鈥 - as in, 鈥淚鈥檓 not at risk of malware because I use a Mac.鈥

Many users believe听that their Apple device is immune听to the viruses; however, this is a myth.

Although the number if viruses targeting听a mac operating system platform is fewer than PC platform, macs also get viruses and they can get damaged.

Ransomware

For the past few years a trend overtook the business market听- ransomware听attacks.听 They have taken place more often because employers failed to educate and train their employees.听

In听these attacks听a malicious piece听of software, sent by a criminal, takes over your files and encrypts those with a secret key. Afterwards it displays a message asking for most common cryptocurrency to give you back your files.

Attacks

Many users do not consider themselves as a high target. however ransomware can sit on your device for a long time and the get activated at work when you take your own device to work.

Even if you connected to a wireless听network, the ransomware can use your network connection and spread across the network.

GET HELP

I.T. Service Desk

I.T. SERVICE DESK
 

Phone(310) 243-2500

Location pinLIB 1223 - Map

ClockMon-Fri: 8am-5pm

Open book and browser

CANVAS & ACADEMIC
TECHNOLOGY SUPPORT

Phone(310) 243-3176 or (310) 243-2500 opt 2

ClockMon-Fri: 8am-6pm

Self-service online

SELF-SERVICE
ONLINE