Regular backups are critical for recovering and restoring data that has been lost or stolen. It is important to protect the Institute’s data by backing up your data regularly and…
Backup Guidelines for Institute-Owned Assets and Data
Ransomware
Ransomware is becoming one of the most widely-known types of cyber attacks today. It is malware that uses asymmetric encryption, or cryptography that uses a pair of keys to encrypt…
Spear Phishing
Spear phishing seems to be a never-ending threat. In fact, a new version is making its way through the Institute. The newest message differs in the subject and content of…
Microsoft 365 Password Change
I am beginning to see a few versions of this phishing scam, but they are all attempts to steal your password. The message may come from MS – Utk –…
Cyber Blackmail
Cyber blackmail is a growing attack vector used to scare the recipient of the associated email.Here is what you need to know about cyber blackmail: This email will tell you…
Compromised NetID
A compromised NetID can resemble a spear phishing attack, but it is quite different. Both spearphishing and compromised NetIDs look like they come from someone within the University, butspear phishing…
Zoom Bombings
With the start of the new semester, it seems that a few zoom bombings have taken place. Zoom bombing, also called Zoom raiding, is when an uninvited person(s) enters a…
Email (Supposedly) From Amazon
Several people have recently reported getting an email that appears to be from Amazon. The email will look similar to this: From: Order Delivery <info@amazonusnow.com>Date: February 3, 2021 at 7:48:46…
Working Securely From Home
This seems to be a very opportune time to remind everyone about how to work securely fromhome. You: First and foremost, technology alone cannot fully protect you; you are the…