Home - Office and Services - Information Technology - Information Technology News
Information Technology News

Latest Posts

Security Awareness Month: If something doesn’t look right, it probably isn’t

By mark hine on September 28, 2015
  • Question changes in your browser or desktop that you did not initiate.
  • Look carefully before responding to unsolicited emails or links.
  • Files or emails that are accidently shared or sent in error should be reported to ITS.
  • Report lost or stolen devices to Campus Safety right away.
  • Big changes are announced; take note of things that are not announced.
  • ITS can help you determine if a change is legitimate – call us at x7111

 

A simple, but important, step you can take to protect your digital life is to maintain awareness. When using your computer or mobile device, note when things are out of place, unexpected, or new without cause.

Emails and websites purporting to be from reputable companies will seldom have poor grammar or spelling. Be wary of unsolicited contact by email or phone, especially when they request any confidential or sensitive information or use an unfamiliar process. These are signs of potential intrusion attempts.

Changes to device backgrounds, new icons that suddenly appear on your desktop, especially after installing “freeware” or other downloaded apps, and other changes to your computing environment may signal that someone, other than you, has access to your device. Free software and apps are more likely to contain malicious code and should be avoided.

Be vigilant when using devices and the network. Report odd or suspicious changes on your computer to ITS. We can help you determine whether your system has been compromised and offer help mitigating issues that are detected.

Report suspected unauthorized access to data, mass email mishaps and any unintended changes to data or systems to ITS. Additionally, please contact ITS if you see confidential or sensitive data in an open environment.

Report lost devices to Campus Safety by calling extension 7333 as soon as possible. Report other suspicious activity in your digital world to ITS by calling extension 7111.

For more information, contact the ITS Help Desk at extension 7111 or email ITSHelp@colgate.edu.


Security Awareness Month: Protect Your Personal Information – Know Your Sender

By mark hine on September 28, 2015

 

  • Phishing is an attempt to gain personal information which poses as a legitimate request.
  • Emails and websites can be made to appear legitimate
  • Never send confidential information via email.
  • Assess the reasoning for the information request. Consider a quick phone call to verify.
  • If you do accidentally respond to a phishing scam, contact ITS right away.

 

Phishing is a type of social engineering that lures individuals by making, what appears to be, legitimate requests for your personal data. Most often in the form of an email, criminals pose as trusted sources to trick you into providing a password or account number but instead use this information to cause harm.

According to experts, 156 million phishing emails are sent globally every day and 10% of those make it through filters. Shockingly, eight million messages are opened and 800,000 fraudulent links are clicked. Often, the emails are convincing. Other times, emails contain misspellings, poor grammar and odd formatting – clues that the request is not on the level.

Consider the information being asked and the source of the email. Links can be spoofed (made to appear like they come from a legitimate source). Logos and familiar icons can make an email or website appear to be genuine. Usually, subtle differences are visible that indicate this type of deception. It pays to be diligent and verify the authenticity of any request with a phone call.

Colgate University, and any legitimate commercial enterprise, will NEVER ask you for your password. Hover over links and check their true destination in the status bar (bottom of your web browser). Verify links on a web page in the same manner. Check the web address in the address bar. Pay close attention to the domain suffix (.com, .org, etc.) Does it originate unexpectedly from a foreign country ( .ru, .cn, .tw)? Many phishing scams originate abroad.

Consider what is being asked of you. Is it reasonable or something you requested? Be wary of offers that seem too good to be true – they usually are. Immediately delete suspect emails.

Report all phishing emails to ITS and let ITS know if you clicked on the link.

For more information, visit: https://www.fdic.gov/consumers/consumer/alerts/phishing.html

For more information, contact the ITS Help Desk at extension 7111 or email ITSHelp@colgate.edu.