Page 29 - NYS_ESS_09-2024
P. 29

local Regional in the e-mail to trick you into thinking they
                                                                    local Regional in the e-mail to trick you into thinking they
                                                                    have a connection to you, making you more likely to click
                                                                    have a connection to you, making you more likely to click
                                                                    a link or attachment that they provide.
                                                                    a link or attachment that they provide.
                                                                 •    Whaling:  Whaling is a popular ploy aimed at getting you to
                                                                 •  Whaling: Whaling is a popular ploy aimed at getting you to
                                                                    transfer money or send sensitive information to an attacker
                                                                    transfer money or send sensitive information to an attacker
           W e have recently been made aware of email scams targeting   via email by impersonating a real NYSAPLS or Regional
           We have recently been made aware of email scams targeting
                                                                    via email by impersonating a real NYSAPLS or Regional
           our association. We wanted to inform you of a common cyber-
           our association. W e wanted to inform you of a common cyber -  officer or board member. Using a fake domain that appears
                                                                    officer or board member
                                                                                       . Using a fake domain that appears
           attack that everyone should be aware of called “phishing”.
           attack that ever yone should be aware of called “phishing”.   similar to ours or the regional’ s, they look like normal emails
                                                                    similar to ours or the regional’s, they look like normal emails
                                              -attack that
                                                                    from people you know and ask you for sensitive information
                    is the most common type of cyber
           “Phishing” is the most common type of cyber-attack that     from people you know and ask you for sensitive information
           “Phishing”
           affects organizations like ours. Phishing attacks can take many    (including usernames and passwords).
                                                                    (including usernames and passwords).
           affects organizations like ours. Phishing attacks can take many
           forms, but they all share a common goal – getting you to share    Best Practices to Avoid Phishing Schemes
           forms, but they all share a common goal – getting you to share
                                                                               void Phishing Schemes
                                                                Best Practices to A
           sensitive information such as login credentials, credit card    Do not click on links or attachments from senders that you
           sensitive information such as login credentials, credit card
                                                                Do not click on links or attachments from senders that you
           information, or bank account details.                do not recognize.
           information, or bank account details.
                                                                do not recognize.
           Although we maintain controls to help protect our networks   •    Do not provide sensitive personal information
           Although we maintain controls to help protect our networks
                                                                 •  Do not provide sensitive personal information
           and computers from cyber threats, it’s important everyone is
           and computers from cyber threats, it’ s important ever yone is   (like usernames and passwords) over email.
                                                                    (like usernames and passwords) over email.
           on the look for suspicious emails.
           on the look for suspicious emails.                    •    W atch for email senders that use suspicious or
                                                                 •  Watch for email senders that use suspicious or
                                                                    misleading domain names.
           We’ve outlined a few different types of phishing attacks to
           W e’ve outlined a few different types of phishing attacks to    misleading domain names.
           watch out for:
           watch out for:                                       How to Report a Phishing Scheme
                                                                How to Report a Phishing Scheme
            •    Phishing:  In this type of attack, hackers impersonate a real   For ward any phishing attempts to the following
            •  Phishing: In this type of attack, hackers impersonate a real
                                                                Forward any phishing attempts to the following
               company to obtain your login credentials. For example,
               company to obtain your login credentials. For example,   two organizations:
                                                                two organizations:
               they could send an e-mail asking you to verify your
               they could send an e-mail asking you to verify your   1 .    The Anti-Phishing W orking Group at
                                                                 1.  The Anti-Phishing Working Group at
               account details with a link that takes you to an imposter   reportphishing@apwg.org
               account details with a link that takes you to an imposter
                                                                    reportphishing@apwg.org
               login screen that delivers your information directly to the
               login screen that delivers your information directly to the   2 .    The Federal T rade Commission (FTC) at
                                                                 2.  The Federal Trade Commission (FTC) at
               attackers.
               attackers.                                           ReportFraud.ftc.gov.
                                                                                    .
                                                                    ReportFraud.ftc.gov
            •    Spear Phishing:   Spear phishing is a more sophisticated
            •  Spear Phishing: Spear phishing is a more sophisticated
                                                                Note: If you ever receive a phishing
               phishing attack that includes customized information that
               phishing attack that includes customized information that   Note: If you ever receive a phishing
                                                                text message you should forward it
               makes the attacker seem like a legitimate sour
               makes the attacker seem like a legitimate source. They   text message you should for ward it
                                                   ce. They
                                                                to SP
                                                                     AM (7726).
               may use a familiar name and refer to NYSAPLS or your    to SPAM (7726).
               may use a familiar name and refer to NYSAPLS or your
                        eying Engineering
            Surveying Engineering
            Sur
                     v
               ec
            T
            Technology Education
                                       y Educa
                                                            tion
                     hnolog
            Join 300 other current surveying students at UMaine in
            pursuit of your educational goals.
            Now Offering:
            Graduate & Undergraduate Certificates
            Bachelor of Science (ABET accredited)
            Professional Science Masters in Engineering and Business
            MS in Engineering Technology (SVT Concentration)
                        UNDERGRAD         $700         GRADUATE
            $485 ONLINE                                TUITION
            per credit TUITION             per credit
            100%              ONLINE.UMAINE.EDU/SURVEYING
            ONLINE!
                                        EMPIRE STATE SURVEYOR / VOL. 60 • NO 5 2024 • SEPTEMBER/OCTOBER   27
   24   25   26   27   28   29   30   31   32   33   34