{"id":1766,"date":"2022-10-13T07:32:00","date_gmt":"2022-10-13T11:32:00","guid":{"rendered":"https:\/\/technews.simmons.edu\/?p=1766"},"modified":"2022-10-12T17:36:02","modified_gmt":"2022-10-12T21:36:02","slug":"phishing-and-social-engineering","status":"publish","type":"post","link":"https:\/\/technews.simmons.edu\/?p=1766","title":{"rendered":"Phishing and Social Engineering"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"alignright size-full\"><a href=\"https:\/\/technews.simmons.edu\/wp-content\/uploads\/2022\/10\/phishing150.png\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/technews.simmons.edu\/wp-content\/uploads\/2022\/10\/phishing150.png\" alt=\"\" class=\"wp-image-1767\"\/><\/a><\/figure>\n<\/div>\n\n\n<p>Phishing and social engineering campaigns are the #1 source of ransomware and other malware[1].<br><em>Phishing<\/em> is a type of cybersecurity attack where malicious actors send messages pretending to be a trusted person. <em>Social Engineering<\/em> is the psychological manipulation of people into performing actions like installing malicious software, clicking a malicious link, or divulging sensitive information.<\/p>\n\n\n\n<p>Reduce your chances of your falling victim to phishing attacks!<\/p>\n\n\n\n<p>Beware of messages that:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Do not clearly identify themselves or their company<\/li><li>Come from an email address that does not match the company\u2019s domain<\/li><li>Do not give full contact information such as the title of sender, the company\u2019s physical address, or phone number<\/li><li>Make too good to be true offers with no strings attached<\/li><li>Ask to pay an upfront fee or asks you to transfer money for them<\/li><li>Ask to give your credit card or bank account numbers<\/li><li>Ask to send copies of personal documents<\/li><li>Remember: DO NOT provide any personal information, especially Social Security numbers or financial information. Legitimate companies would not ask for this information over the phone or email.<\/li><\/ul>\n\n\n\n<p>If an email looks suspicious, do not respond and do not click on any links or attachments. When available, \u201cReport phishing\u201d to block other suspicious emails.<\/p>\n\n\n\n<p>[1] 2021 Verizon Data Breach Investigations Report (DBIR)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing and social engineering campaigns are the #1 source of ransomware and other malware[1].Phishing is a type of cybersecurity attack where malicious actors send messages pretending to be a trusted person. Social Engineering is the psychological manipulation of people into performing actions like installing malicious software, clicking a malicious link, or divulging sensitive information. Reduce [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[26,3],"tags":[104,38,39,12,109],"class_list":["post-1766","post","type-post","status-publish","format-standard","hentry","category-special-news","category-technews","tag-104","tag-cybersecurity","tag-cybersecurityawarenessmonth","tag-information-security","tag-phishing"],"_links":{"self":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1766","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1766"}],"version-history":[{"count":1,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1766\/revisions"}],"predecessor-version":[{"id":1768,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1766\/revisions\/1768"}],"wp:attachment":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1766"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1766"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1766"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}