Social Engineering can happen anywhere

Always pay attention to your surroundings. Shoulder surfing is a form of social engineering behavior used by those with malicious intent to gain access to the private information of others such as usernames, passwords, personal identification numbers (PINs) and such other confidential data by looking over the victim’s shoulder without the victim’s knowledge. Some tips

Ransomware

What is Ransomware? Ransomware is malicious software that is installed onto your device once it is compromised, that will both take over important files on the device, or the entire device, and request a ransom be paid for the user to regain access. While ransomware isn’t new to the cybercriminals resume, other advances in technology

Potential Hurricane Dorian Cyber Scams

The Cybersecurity and Infrastructure Security Agency (CISA) warns users to remain vigilant for malicious cyber activity targeting Hurricane Dorian disaster victims and potential donors. Fraudulent emails commonly appear after major natural disasters and often contain links or attachments that direct users to malicious websites. Users should exercise caution in handling any email with a hurricane-related

Before You Connect a New Computer to the Internet – Security Tips

Why is computer security important? Because computers play such critical roles in our lives, and because we input and view so much personally identifiable information (PII) on them, it’s imperative to implement and maintain computer security. Strong computer security ensures safe processing and storage of our information. How can I improve my computer’s security? The

CrowdStrike Falcon Endpoint Protection at Fordham University

Fordham University is partnering with CrowdStrike and will be implementing an endpoint detection and response (EDR) solution. This is an advanced security tool that detects malware, viruses, and many other kinds of malicious activity. How can I ensure my workstation is protected? Fordham IT will be deploying this product via the Fordham network. Employees should

previous arrow
next arrow
previous arrownext arrow
Slider

One of the most common cyber attacks involves sending e-mails posing as friends, professors and coworkers. Attackers are hoping you share your credentials and other personal information that they can use to compromise your account.

Learn how to identify and protect yourself against Spam and Phishing attacks HERE.

Need to quickly report a phishing or spam e-mail? Cofense Reporter lets Fordham members easily report and delete spam and phishing e-mails. The Cofense Reporter button is available to use once you log into your Fordham Gmail account.

Learn how to use Cofense Reporter HERE.

Ransomware attacks are on the rise and can cripple entire businesses and institutions. Attackers are looking to encrypt and lock your data so that you or your organization will have to pay money to get it back.

Learn more about Ransomware and how to protect yourself HERE.

Cybersecurity Tips

Cybersecurity is the shared responsibility of everyone. Students, staff and faculty alike can help contribute to an enviroment of safe online practices. There are many things you can do to help keep everyone’s information safe.

  • Use a hard to guess password with special characters and random numbers.
    Refrain from including dictionary words and instead use abbreviations or acronyms of phrases you'll remember. Include random numbers and special characters, such as #, to make it more secure against password cracking software. Never share your password with anyone else.
  • Never download links or attachments from untrusted e-mails and websites.
    When presented a link from an e-mail or webpage, hover your mouse over the link to make sure the URL is recognizable. For example, if you intend to download something from Microsoft and you see the URL is from “microzooft.com”, then most likely the link is not legitimate and possibly malicious.
  • Avoid using public Wi-Fi and computers when traveling.
    When using an open wireless network, other people may be able to sniff and view your online traffic. Do not conduct sensitive activities such online shopping, banking or university work. If you must, only visit sites that start with "https://" and not "http://". Be cautious of using public computers in places like hotels, libraries and cyber cafes as they may have malware and key loggers installed.
  • Protect and watch over your devices when traveling and in public.
    To prevent theft of your devices, always check your surroundings and make sure your devices are within eye sight. Do not leave phones, laptops, USB and external hard drives unattended. Ensure your work devices and hard drives are encrypted before traveling. For more information, see the top menu of this page under Resources > Disk Encryption for Fordham's Encryption Policies.
  • Don’t leave confidential information out in the open.
    If you are handling confidential information with anyone's personal identifiable information, make sure to lock your computer or keep papers locked away in a secure space.

Security Alerts

UISO TWITTER FEED