Test Inspiration: RingCentral, similar to platforms like Teams or Slack, is a renowned communications tool. Its widespread use in the business sector makes it familiar to many professionals, and thus, an attractive target for cybercriminals. Attackers often craft emails with stylized HTML designs that resemble genuine RingCentral notifications. A common bait is to alert the […]
Category Archives: Information Security
PII Refresher
Personally identifiable information, or PII, is a common term associated with data privacy regulations. While “PII” is specific to the United States (other countries call it personal data or simply personal information), the concept of what PII is and why it’s so important translates globally. Here’s what you need to know: PII includes many types […]
Why Policies Matter
If work-related security concepts were given a slogan, it would probably be “always follow policy.” In fact, you’ve probably encountered that statement many times, and for good reason. Policies are created to keep data, systems, and people safe. Without clearly defined policies, organizations would struggle to maintain security. They would also struggle to adhere to […]
Maintaining Your Digital Well-being
Developing good habits in life is the key to strong physical and mental health. Research shows that people who regularly eat healthy foods and exercise are generally happier. A commitment to those habits (and many others) can be challenging, but it’s a fundamental part of living a fulfilling life. Similarly, you can take actions that […]
[Rescheduled for Feb 2nd] – IT System Security Updates
***RESCHEDULED*** The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, February 2nd. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and […]
Anatomy of a Phish: January 2024 Phishing Simulation
Test Inspiration: In February 2022, ‘alias impersonation’ attacks surged, making up approximately 32.2% of all cyber incidents. These attacks heavily utilize social engineering, creating a sense of urgency in their targets. This urgency often drives individuals to take actions like clicking links, opening attachments, or hastily responding to messages. Phishing Email Context: The phishing email […]
IT MAINTENANCE FRIDAY (SYSTEM SECURITY UPDATES)
The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, January 26th. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]
Second Major Cyberattack in Higher Education This Year : Kansas State University
Kansas State University recently announced a major cybersecurity incident is to blame for VPN, email, and online learning system disruptions affecting students and employees at that institution. This news follows another major attack on Memorial University of Newfoundland earlier this month. Both incidents are believed to be ransomware attacks. Ransomware is a particularly dangerous form […]
Taking Home Security Awareness
Working from home makes you no less a target for cybercriminals. Here’s a quick refresher of general security etiquette you should take home with you. Passwords Passwords represent a key part of security. Ensure yours are long, unique, and conform to your organization’s policies. You may also consider using passphrases — easy-to-remember sentences that are […]
Artificial Intelligence and the Future of Society
Artificial intelligence (AI) refers to the simulation of human intelligence in machines that are programmed to think and learn like humans. AI can be divided into several different types, including: Rule-based systems, which follow a set of predetermined rules to reach a conclusion Expert systems, which use a knowledge base to make decisions Neural networks, […]