CIO'S MESSAGE - October 29, 2024

A Message from the Vice President & CIO


Cybersecurity Awareness Month

Three Nightmarish Tales That Have Spooked 新澳门六合彩资料


The Ghost of the Fake Job Offer

Image
Ghost & goblins cartoon images

It all began with an innocent-looking email. The subject line read: 鈥淓xciting Job Opportunity 鈥 Apply Now!鈥 The sender claimed to be a reputable person looking for students to fill easy, work-from-home positions. The qualifications were minimal, the pay was generous, and the selection process was almost nonexistent. It seemed like a dream come true!

Clarice, a diligent student juggling classes and part-time work, was thrilled. She quickly applied and, to her delight, was 鈥渉ired鈥 almost immediately. The job seemed simple enough: deposit a check sent by the company, keep a portion as her salary, and transfer the rest to various accounts for 鈥渂usiness expenses.鈥

But as Clarice followed the instructions, a chill ran down her spine. The company鈥檚 emails were vague and urgent. Days later, her worst nightmare came true. The bank notified her that the check was fraudulent. The funds were gone, and her account was overdrawn. The 鈥渃ompany鈥 had vanished, leaving Clarice with a financial mess and a heavy heart.

The Luring Request

Image
Monster being tempted by a unknown request

It was a normal day, but lurking in the digital shadows was a sinister scam.  It began with a simple email: 鈥淎re you available?鈥 The sender appeared to be Dr. Krueger, the Dean of the college. Professor Nancy, eager to help, replied quickly. Dr. Krueger asked her to buy gift cards for an urgent event. Without hesitation, Nancy purchased the cards and sent the codes.

Later, a chilling realization hit her. Dr. Krueger knew nothing about the request. Nancy had been scammed out of hundreds of dollars. The emails were from a phantom, exploiting the trust and authority of university officials.

The Fake Document Bait

Image
A student was hack but campus IT intervened.

Costumes, decorations, and spooky stories filled the air. But in the digital realm, a more sinister story was unfolding.  It started with an email. The subject line read: 鈥淚mportant Document 鈥 Please Review.鈥 The sender appeared to be Professor Addams, a well-respected faculty member. The email contained a link to a SharePoint document, supposedly urgent university business.

Morty, a diligent student, received the email and clicked the link without a second thought. The page looked legitimate, asking for his university login credentials to access the document. He entered his details and waited for the document to load. But instead of important information, he was met with an error message. He later discovered his school account was hacked and used to email thousands of 新澳门六合彩资料 accounts with a similar scam until his account was eventually detected and seized by campus IT.

In Summary

Let these generalized but true chilling tales be a warning. Scammers are lurking in the shadows, preying on our university community.  Stay vigilant and arm yourself with the best phishing defense tips at Beware of Phishing Scams at 新澳门六合彩资料.

Cybersecurity Awareness Month Activities and Resources

  • Creepy Tales from the Web video
  • WIN LB SWAG! Test your Cybersecurity knowledge by taking  and be included in a drawing for one of many LB swag packs. Quiz closes October 31, 2024. Winners will be contacted via email.