
I want to let everyone know that there are two new phishing attempts coming through the Institute’s email today. These are both spam and should be forwarded, including the Internet…
I want to let everyone know that there are two new phishing attempts coming through the Institute’s email today. These are both spam and should be forwarded, including the Internet…
By default, web browsers are not configured with the most secure setting. These settings must be changed by the user. It is very important to configure the browser to be…
Did you know that if you don’t properly report an incident it could cost your department and the Institute a lot of money, as in the 5- and 6-figure amounts?…
Regular backups are critical for recovering and restoring data that has been lost or stolen. It is important to protect the Institute’s data by backing up your data regularly and…
Ransomware is becoming one of the most widely-known types of cyber attacks today. It is malware that uses asymmetric encryption, or cryptography that uses a pair of keys to encrypt…
Spear phishing seems to be a never-ending threat. In fact, a new version is making its way through the Institute. The newest message differs in the subject and content of…
I am beginning to see a few versions of this phishing scam, but they are all attempts to steal your password. The message may come from MS – Utk –…
Cyber blackmail is a growing attack vector used to scare the recipient of the associated email.Here is what you need to know about cyber blackmail: This email will tell you…
A compromised NetID can resemble a spear phishing attack, but it is quite different. Both spearphishing and compromised NetIDs look like they come from someone within the University, butspear phishing…