Student Inform—October 14, 2024

Contents:


Cybersecurity: Staying Safe Starts with YOU!

Every 36 seconds, someone like you falls victim to a cyber attack. These attacks can come from various sources, including unsolicited emails, phishing attempts, and malicious websites.

Cybercriminals are becoming increasingly sophisticated in their tactics. They may impersonate trusted individuals or organizations to trick you into sharing sensitive information. For instance, you might receive an email claiming to be from your bank, asking you to verify your account details.

But it's not just about emails. Even legitimate-looking websites can be a front for malicious activity. Criminals can create websites that mimic popular online services like banks, retailers, and social media platforms. These fake websites, often known as phishing sites, may look identical to the real ones, making it difficult to distinguish between them.
Read this article about the tragic cases of individuals who lost their lives after purchasing counterfeit prescription drugs from fraudulent websites.

How can you protect yourself?

  • Be cautious of unsolicited emails and messages. If you're unsure about the sender, don't click on any links or attachments.
  • Verify the legitimacy of websites. Check the URL carefully for any misspellings or unusual characters.
  • Use strong, unique passwords. Avoid using the same password for multiple accounts.
  • Enable two-factor authentication (2FA) whenever possible. This adds an extra layer of security to your accounts.
  • Stay informed about the latest cybersecurity threats. Keep your software and operating system up-to-date with the latest security patches.

Cybersecurity affects everyone, including you. Your personal data, privacy, and financial security are at stake. By following these simple steps, you can significantly reduce your risk of becoming a victim of a cyberattack.

For more information and resources, visit our cybersecurity website.

Return to top of page


Cybersecurity Presentation: AI Voice Automated Cloning Scams

Did your distressed mother just call you for help? Are you certain it was your mother? Artificial Intelligence technology is advancing rapidly and available to a large audience. Not all uses of AI are to make our lives easier. Learn how to spot AI voice scams in this engaging talk by Dr. Humayun Zafar (Professor of Information Security and Assurance).

Tuesday, Oct, 22, 11–11:30 a.m. via Teams—Register on Owl Life

Return to top of page


Cybersecurity Awareness Training: Let's Hit 7000!

Hooty Hoo, student assistants! Over 3000 of you have completed Fall 2024 Cybersecurity Awareness Training. Can we soar to 7000 by the end of this week?

Remember: The USG requires all KSU employees, including student assistants, to complete this training by October 31. Don't wait!

How to Complete Your Training

The training is available on KnowBe4, the USG's cybersecurity training platform. You can complete the training online or in person:

  • Tuesday, October 22, from 10–10:30 a.m. in the J.M. Wilson Student Center, room A216 (Marietta)

Need help? UITS is here for you! Contact the KSU IT Service Desk with any questions or concerns.

Thank you for helping protect university data!

Return to top of page

©