Anatomy of a Phish: January 2024 Phishing Simulation

Test Inspiration: In February 2022, ‘alias impersonation’ attacks surged, making up approximately 32.2% of all cyber incidents. These attacks heavily utilize social engineering, creating a sense of urgency in their targets. This urgency often drives individuals to take actions like clicking links, opening attachments, or hastily responding to messages. Phishing Email Context: The phishing email […]

IT MAINTENANCE FRIDAY (SYSTEM SECURITY UPDATES)

The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, January 26th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]

Second Major Cyberattack in Higher Education This Year : Kansas State University

Kansas State University recently announced a major cybersecurity incident is to blame for VPN, email, and online learning system disruptions affecting students and employees at that institution. This news follows another major attack on Memorial University of Newfoundland earlier this month. Both incidents are believed to be ransomware attacks. Ransomware is a particularly dangerous form […]

Taking Home Security Awareness

Working from home makes you no less a target for cybercriminals. Here’s a quick refresher of general security etiquette you should take home with you. Passwords Passwords represent a key part of security. Ensure yours are long, unique, and conform to your organization’s policies. You may also consider using passphrases — easy-to-remember sentences that are […]

Artificial Intelligence and the Future of Society

Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think and learn like humans. AI can be divided into several different types, including: Rule-based systems, which follow a set of predetermined rules to reach a conclusion Expert systems, which use a knowledge base to make decisions Neural networks, […]

Securing Your Smart Devices

Isn’t it annoying when a webpage won’t load? Imagine how much more annoying it would be if every website you visit on a daily basis suddenly stopped working. That’s what happens during major DDoS attacks that target internet servers. What is DDOS? DDoS stands for distributed denial-of-service. It’s a cyberattack that floods servers with more […]

Opportunity Cost of a Connected World

The Internet of Things, or IoT, refers to the broad range of internet-connected devices that offer many different services and functionality. From consumer products, like digital assistants and remotely accessible security cameras, to smart hospitals and manufacturing plants, the potential advantages of the IoT are nearly limitless. But there’s also an opportunity cost associated with […]

Charger Chats Personal Cybersecurity Presentation Link & Notes

Cybersecurity: Our Digital Dumpster Fire, our latest personal cybersecurity presentation featured in this month’s Chargers Chat, is available online and contains links to many thought-provoking news stories and online resources you can take advantage of to protect yourself online. Footnotes and Resources: How Apple and Amazon Security Flaws Led to My Epic Hacking | Wired […]

IT MAINTENANCE FRIDAY (SYSTEM SECURITY UPDATES)

The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, December 1st. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]

Becoming a Security Champion

An organization’s culture is only as healthy as the people who form it. Like a houseplant, culture needs some care and attention to maintain its strength and continue to grow. Security champions play a key role in that vital process. Let’s explore this concept by answering a few common questions. What is a security champion? […]