Posts Tagged ‘phishing’

hacking threats

View this post on Instagram

The first step in defeating the enemy is understanding it. I made an Instgran Story sharinb about that one time my dad and the company he works for almost got hacked for €35,000 by a hacker who used advanced Spyware and Phishing tactics. Watch it on my latest stories! It's a real thing, cyber-attacks are becoming more and more common, and the story about my dad is the perfect example of that!

A post shared by WORLDWIDE ENGINEERING 🌍 (@worldwide_engineering) on

Protect Student Data

Six Ways to Protect Student Data and Prevent Cyberattacks

By Ricky Doyle     Dec 10, 2018

https://www.edsurge.com/news/2018-12-10-six-ways-to-protect-student-data-and-prevent-cyberattacks

School administrators and IT staff can be super-vigilant, but the hackers are getting better and better at sneaking through security.

the most common cybersecurity threats, and how can school staff avoid them?

Eavesdropping / Man-in-the-Middle (MiTM) Attacks

What they are: It’s likely that you sometimes use a school laptop or mobile device to gain internet access via Wi-Fi networks in public places like coffee shops or airports. If so, be aware that there may be hackers eavesdropping to try and gain entry to any two-party exchange you make so they can filter and steal data.

How to avoid them: Always use a school-verified SIM carddongle or VPN(virtual private network) to access the internet in public places.

Social Engineering Attacks

According to Verizon’s 2018 Breach Investigations report, 92 percent of malware is delivered via email, often referred to as social engineering attacks. The aim is to interact with the user and influence and manipulate their actions to gain access to systems and install harmful software. Malware uses various guises. Here are some of the most common:

1. Phishing emails

2. Baiting attacks

3. Quid pro quo requests

4. Pretexting attacks

5. Contact with a ‘compromised’ website

Malware, Phishing, Hacking, Ransomware

Keeping Safe in a Digital World

How Not to be Hacked

Malware, Phishing, Hacking, Ransomware – oh my! Learn about the threats to you, your users and your library.  During this session, we will explore the threats to online security and discuss solutions that can be implemented at any level. Most importantly, we will look at how we can educate our users on current threats and safety

Date: December 5th, 10AM

Presenter: Diana Silveira

Register: https://netforum.avectra.com/eweb/DynamicPage.aspx?Site=SEFLIN&WebCode=EventDetail&evt_key=bec597af-02dd-41a4-9b3a-afc42dc155e4

Webinar December 5, 2017 10 AM

  • create policies. e.g. changing psw routinely
  • USB blockers for public computers (public libraries). like skimmers on gas stations
  • do not use admin passwords
  • software and firmware updates.
  • policy for leaving employees
  • HTTP vs HTTPS
  • Cybersecurity KNowledge Quiz Pew research Center
    http://www.pewinternet.org/quiz/cybersecurity-knowledge/ 

diana@novarelibrary.com

slideshare.net/dee987

facebook.com/novarelibrary

twitter @Novarelibrary

+++++++++++
more on hacking in this IMS blog
https://blog.stcloudstate.edu/ims?s=hacker

fake emails

Why everyone still falls for fake emails

By Richard Matthews  Jul 31, 2017

https://gcn.com/articles/2017/07/31/why-fake-emails-still-work.aspx

Phishing is likely to get only more sophisticated.

Based on my experience in Tallinn, we will see companies become more transparent in how they deal with cyber attacks. After a massive cyber attack in 2007, for example, the Estonian government reacted in the right way.

free anti-phishing software

+++++++++++++++++++++
more on phishing in this IMS blog
https://blog.stcloudstate.edu/ims?s=phishing+

K12 cyber incidents

K–12 Cyber Incidents Have Been Increasing in 2017

The creator of a national K–12 Cyber Incident Map warns that schools should act now, not later, to bolster their security.

By Richard Chang 06/08/17

https://thejournal.com/articles/2017/06/08/k12-cyber-incidents-have-been-increasing-in-2017.aspx

Ed Tech Strategies' K–12 Cyber Incident Map. Courtesy of Doug Levin.

K–12 Cyber Incident Map , Doug Levin, president of Ed Tech Strategies

Levin has been tracking the publicly disclosed K–12 incidents on a color-coded map on his website, edtechstrategies.com. His sources include media reports, DataBreaches.net and the Privacy Rights Clearinghouse.

In a post published this week on the newly revamped Ferpa Sherpa education privacy site, Levin argues that not only have schools been “experiencing an increasing number of cyber incidents,” but “the range of cyber threats affecting schools appears to be diverse and shifting over time.”

K12 cyber incidents 2016 to present

concrete steps schools can take to improve their security, such as:

  • Use special software or hardware to protect data;
  • Create better password and authorization policies;
  • Use secondary authentication methods;
  • Train school staff, particularly about phishing and downloading of unfamiliar files; and
  • Hire more staff with IT security expertise.

++++++++++++++++++++
more on cyber security in this IMS blog
https://blog.stcloudstate.edu/ims?s=cybersecurity

phishing

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure

L Date of Publication: 04.18.17.

Sneaky Exploit Allows Phishing Attacks From Sites That Look Secure

You know by now to check your browser while visiting a site to be sure it sports the little green padlock indicating TLS encryptionhttps://en.wikipedia.org/wiki/Transport_Layer_Security

 

+++++++++++++
more on phishing in this IMS blog
https://blog.stcloudstate.edu/ims?s=phishing