Information Technology Services recommends WSU community members decline all MFA challenges that aren’t personally initiated in response to new threats from cyber attackers.
This week, malicious parties have tried to bypass MFA by relying on user fatigue. The attacker gets the user to approve one of numerous MFA requests sent after they obtain a valid username and password.
Over the past several months, a series of announcements has been published on cyber security and steps that you can take to safeguard yourself, your home, and the university from cyber-attacks. If at any time you want to review the information from the announcements or share with others, simply go to wsu.edu and search for […]
Physical security is an important part of cyber security. Bad actors can locate physical files disposed of or stored improperly in easily accessible locations, garbage cans, dumpsters, or even copy machines or other devices no longer in use. To keep university data secure, take the following steps: Ensure only authorized personnel access secure locations: BPPM […]
Even with good defenses and workforce training, the university may still get hacked or have data compromised. Devices can be lost or stolen or an email with sensitive information can go to the wrong person. In accordance with Executive Policy (EP) #8 University Data Policies, every effort must be made to ensure the availability, accuracy, […]
When it comes to thwarting the attempts of cyber attackers, you are the university’s best defense! Although technology such as firewalls, antivirus, encryption, etc., are key to maintaining a safe and secure working environment, they cannot protect against all attacks such as viruses, ransomware, and trojans. Any operating system can become infected. Ensure that your […]
Attackers obtain your personal information through publicly available sources such as social media sites or may purchase personal information online. This information is then used to personalize their social engineering scams. They may try and trick you into believing that they have information that would be detrimental if released or that they somehow already have […]
Insider threats are people with legitimate access to the university network who use their access in a way that causes harm. Insider threats are difficult to detect and can go unnoticed for months or years. Whether the insider is a malicious employee or a contractor with compromised credentials, the university and university employees must stay […]
You may have seen the recent announcement on cyber security tips for working remotely and noticed several references to endpoints. As we have received follow-up questions about endpoints, we would like to take this opportunity to provide clarification. An endpoint is a remote computing device that communicates back and forth with a network to which […]
Cyber security is just as important at home as it is at work and is key if you are working remotely. Take steps to secure your network. Your wi-fi router is what controls your wireless network, and it most likely came with a default username and password: Change the password to a unique password that […]