{"id":1538,"date":"2024-02-21T13:24:51","date_gmt":"2024-02-21T19:24:51","guid":{"rendered":"https:\/\/web.saumag.edu\/its\/?page_id=1538"},"modified":"2024-09-10T11:55:03","modified_gmt":"2024-09-10T16:55:03","slug":"phishing","status":"publish","type":"page","link":"https:\/\/web.saumag.edu\/its\/information\/policies\/phishing\/","title":{"rendered":"Phishing Training Policy"},"content":{"rendered":"\t\t
A spoof on the sport of fishing, phishing is a cyber attacker\u2019s method of casting \u201cbait\u201d to \u201ccatch\u201d valuable information. The valuable information can then be used to reel in the prize. Phishers can make emails look very authentic, duplicating images and landing pages.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t
Be suspicious:<\/p>
It is best to not use <\/b>the same password or a combination of the same password for all apps. If one phishing attempt is successful, the attacker has \u201ckeys to your kingdom.\u201d<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t Be suspicious:<\/p> If you receive a suspicious phone call, hang up. If necessary, call the company, coworker, etc., and inquire about the subject matter for which the suspicious phone call was referencing.<\/i><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t Annually, cybersecurity training resources are provided to SAU employees in the Faculty\/Staff Virtual Center. Completion of training videos and educational material is an essential tool each member of the SAU community can use to avoid unnecessary risk to the network.<\/p> The SAU ITS cybersecurity specialist leads our phishing training efforts by participating in the industry standard practice of routinely conducting phishing email campaigns as a method of evaluating network risk.<\/p> What happens if a user enters credentials when requested in a simulated phishing campaign?<\/em><\/strong><\/p> The purpose of phishing campaigns is to enhance SAU\u2019s cybersecurity posture and reduce risk.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t Cybersecurity Awareness: Phishing https:\/\/www.youtube.com\/watch?v=sEMrBKmUTPE&ab_channel=SANSOffensiveOperations What is phishing? A spoof on the sport of fishing, phishing is a cyber attacker\u2019s method of casting \u201cbait\u201d to \u201ccatch\u201d valuable information. The valuable information can then be used to reel in the prize. Phishers can make emails look very authentic, duplicating images and landing pages. How can you spot… Read More<\/a><\/p>\n","protected":false},"author":564,"featured_media":0,"parent":63,"menu_order":46,"comment_status":"closed","ping_status":"closed","template":"elementor_header_footer","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"class_list":{"0":"post-1538","1":"page","2":"type-page","3":"status-publish","5":"entry"},"_links":{"self":[{"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/pages\/1538","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/users\/564"}],"replies":[{"embeddable":true,"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/comments?post=1538"}],"version-history":[{"count":3,"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/pages\/1538\/revisions"}],"predecessor-version":[{"id":1618,"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/pages\/1538\/revisions\/1618"}],"up":[{"embeddable":true,"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/pages\/63"}],"wp:attachment":[{"href":"https:\/\/web.saumag.edu\/its\/wp-json\/wp\/v2\/media?parent=1538"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}How can you identify a phishing phone call?<\/h3>
Did you know:<\/h3>
Cybersecurity Awareness Training Policy: Phishing<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t
\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t