{"id":1858,"date":"2023-10-12T13:45:56","date_gmt":"2023-10-12T17:45:56","guid":{"rendered":"https:\/\/technews.simmons.edu\/?p=1858"},"modified":"2023-10-12T14:07:04","modified_gmt":"2023-10-12T18:07:04","slug":"phishing-and-social-engineering-2","status":"publish","type":"post","link":"https:\/\/technews.simmons.edu\/?p=1858","title":{"rendered":"Phishing and Social Engineering\u00a0"},"content":{"rendered":"\n<p>Phishing and social engineering campaigns are still a top source of ransomware and other malware[1].&nbsp;<\/p>\n\n\n\n<p><strong>Phishing <\/strong>is a type of cybersecurity attack where malicious actors send messages pretending to be a trusted person.&nbsp; <strong>Social Engineering<\/strong> is the psychological manipulation of people into performing actions like installing malicious software, clicking a malicious link, or divulging sensitive information.<\/p>\n\n\n\n<p>Reduce your chances of your falling victim to phishing attacks!<\/p>\n\n\n\n<p>Beware of messages that:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Do not clearly identify themselves or their company<\/li>\n\n\n\n<li>Come from an email address that does not match the company\u2019s domain<\/li>\n\n\n\n<li>Do not give full contact information such as the title of sender, the company\u2019s physical address, or phone number<\/li>\n\n\n\n<li>Make too good to be true offers with no strings attached<\/li>\n\n\n\n<li>Ask to pay an upfront fee or asks you to transfer money for them<\/li>\n\n\n\n<li>Ask to give your credit card or bank account numbers<\/li>\n\n\n\n<li>Ask to send copies of personal documents<\/li>\n\n\n\n<li>Remember: DO NOT provide any personal information, especially Social Security numbers or financial information. Legitimate companies would not ask for this information over the phone or email.<\/li>\n<\/ul>\n\n\n\n<p>If an email looks suspicious, do not respond and do not click on any links or attachments. When available, \u201cReport phishing\u201d to block other suspicious emails.<\/p>\n\n\n\n<p>[1] 2023 Verizon Data Breach Investigations Report (DBIR)<\/p>\n\n\n\n<p>Please send any questions or concerns to Simmons Information Security Officer, <a href=\"mailto:Kristen.Howard@simmons.edu\">Kristen Howard<\/a>, or the <a href=\"https:\/\/servicedesk.simmons.edu\">Technology Service Desk<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing and social engineering campaigns are still a top source of ransomware and other malware[1].&nbsp; Phishing is a type of cybersecurity attack where malicious actors send messages pretending to be a trusted person.&nbsp; Social Engineering is the psychological manipulation of people into performing actions like installing malicious software, clicking a malicious link, or divulging sensitive [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[26,3],"tags":[147,39,109,146],"class_list":["post-1858","post","type-post","status-publish","format-standard","hentry","category-special-news","category-technews","tag-147","tag-cybersecurityawarenessmonth","tag-phishing","tag-social-engineering"],"_links":{"self":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1858","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1858"}],"version-history":[{"count":1,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1858\/revisions"}],"predecessor-version":[{"id":1859,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=\/wp\/v2\/posts\/1858\/revisions\/1859"}],"wp:attachment":[{"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1858"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1858"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technews.simmons.edu\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1858"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}