01/08/2024 | News release | Distributed by Public on 01/08/2024 20:23
Colleges and universities have recently reported a rise in social engineering attacks targeting users. Cybercriminals are employing increasingly sophisticated manipulation techniques to compromise sensitive information and systems. Understanding the common tactics and signs of these attacks is the best defense and is crucial for keeping our University's information, networks, and yourself safe and secure.
Social engineering involves manipulating individuals through direct human interaction to obtain sensitive information about a person or organization. The most common tactics used by attackers include:
Social engineering attacks can be identified by certain tactics and signs. Be on the lookout for these red flags:
Recently, there have been reports of bad actors reaching out to help desks outside regular hours, attempting to convince staff to make unauthorized changes to user accounts. This tactic is part of their effort to exploit institutional vulnerabilities by catching employees off guard when oversight might be reduced.
If you receive any suspicious requests or communications, do not respond or provide any information. Instead, utilize the Report Phishing button in Outlook or call the Technology Service Desk to report the incident to IT Security. Taking these actions is crucial to preventing attempts that may compromise both you and the entire Seton Hall community.
For more information, check out a printable infographic on five ways to spot a phishing email, and visit www.shu.edu/technology/phishing-scams.
Categories: Science and Technology