Cyber security tips: Technology alone won’t protect you
When it comes to thwarting the attempts of cyber attackers, you are the university’s best defense! Although technology such as firewalls, antivirus, encryption, etc., are key to maintaining a safe and secure working environment, they cannot protect against all attacks such as viruses, ransomware, and trojans.
Any operating system can become infected. Ensure that your system is updated automatically and that all patches are installed.
Look out for:
- Urgent emails asking you to act before you can verify the request
- Emails that sound too good to be true
- Odd or urgent messages from co-workers, especially ones that ask you to bypass policy or controls
If you notice any of these signs or there is just something strange about a message from someone you know or work with, email that person directly with a new email instead of responding to the suspicious email. Or, pick up the phone and call them to verify. Criminals will try to intimidate you, especially when posing as your supervisor. Do not be afraid to reach out to verify the suspicious request.
If you suspect that your system or devices may be infected, contact IT Security Services immediately at firstname.lastname@example.org.