Feed on
Posts
Comments

Category Archive for 'syndicated-posts'

These 2 seemingly distinct topics are very related.  In the last 10 days I have been alerted to 16 data breaches that date back to 2017 and contain some number of accounts that have @wesleyan.edu in their account information.  The reasons for the delayed notifications can be varied–companies are just finding out, companies don’t want … Read moreThe critical need to keep your account passwords distinct and the value of your personal information 07/23/2019

Securing accounts has been a problem for quite a while.  We often rely solely upon passwords.   If done right, we use unique passwords for each account.  Yes, that can become unwieldy and I wrote an article about password managers that very much takes most of the pain away from that process.  However, there is an … Read moreMulti/Dual-factor Authentication–What is it and why use it? 07/18/2019

Some IT terms to know 1)Social Engineering—in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. 2)Dox/Doxxing—Doxing or doxxing is the Internet-based practice of researching and broadcasting private or identifying information about an individual or organization. The methods employed to acquire this information include searching publicly […]

How to better cybersecure your home— The home is our place of comfort and implied security. However, cybersecurity is not in a default secure state of “on” when devices come from the factory. That is up to us to when we bring the device(s) home and turn them on. This is a small list of […]

Curiosity is a strong driver.  Sometimes it is “can I do this”, “How do I do this”, “Oooooh. Something new to try”.  I was faced with this, yesterday with a SUB stick. My CIO asked I come see him in the office, held up a USB stick and said he had found it while walking. […]

Notice–Elsevier platform (e.g. Mendeley, Scopus, ScienceDirect) system compromise–PLEASE CHANGE YOUR ACCOUNT PASSWORD   https://motherboard.vice.com/en_us/article/vbw8b9/elsevier-user-passwords-exposed-online   According to the article they’ll be notifying users, but if you have an account on an Elsevier platform (e.g. Mendeley, Scopus, ScienceDirect) you should change your password now, as well as changing the password on any other accounts you have […]

Beware what looks too good to be true–easy money. How this works is pretty straight-forward.  Once the communication begins between the two of you more information will be asked.  Things like SSN and bank numbers will be needed to deposit money.  The funds will be far beyond your pay range to cover costs of some […]

Though this article looks dated (2018) it is a current notification—-   As of May 2018, the FBI has seen an increase in cyber criminals exploiting the cardless ATM feature of mobile banking applications to compromise accounts and fraudulently withdraw cash from ATMs. Cardless ATM transactions use a code and a mobile phone for authentication […]

Staying secure while traveling  Whether its personal or work-related travel, there are things you can do to protect your information and systems.    Before you go  If a device, credit card, or document is not required for your travel, leave it at home.  Ensure that all your electronic devices are password protected and encrypted if possible in […]

Sender: microsoftexchange329s7d8ae4615bbc36ab6ce471ec88aae4615bbcaae4615
Subject: You have received a document from Onedrive

 
If you click the link it takes you to some non-wesleyan location:
hxxp://servicesll.blob43.core.windows.net/$web43/micr…

Next »