The critical need to keep your account passwords distinct and the value of your personal information 07/23/2019

These 2 seemingly distinct topics are very related.  In the last 10 days I have been alerted to 16 data breaches that date back to 2017 and contain some number of accounts that have @wesleyan.edu in their account information.  The reasons for the delayed notifications can be varied–companies are just finding out, companies don’t want … Read moreThe critical need to keep your account passwords distinct and the value of your personal information 07/23/2019

Multi/Dual-factor Authentication–What is it and why use it? 07/18/2019

Securing accounts has been a problem for quite a while.  We often rely solely upon passwords.   If done right, we use unique passwords for each account.  Yes, that can become unwieldy and I wrote an article about password managers that very much takes most of the pain away from that process.  However, there is an … Read moreMulti/Dual-factor Authentication–What is it and why use it? 07/18/2019

Curisoity and the cat–Don’t let your curiosity get the best of you–03/28/2019

Curiosity is a strong driver.  Sometimes it is “can I do this”, “How do I do this”, “Oooooh. Something new to try”.  I was faced with this, yesterday with a SUB stick. My CIO asked I come see him in the office, held up a USB stick and said he had found it while walking. … Read moreCurisoity and the cat–Don’t let your curiosity get the best of you–03/28/2019

Cardless ATM transactions and thieves–3/11/2019

Though this article looks dated (2018) it is a current notification—-   As of May 2018, the FBI has seen an increase in cyber criminals exploiting the cardless ATM feature of mobile banking applications to compromise accounts and fraudulently withdraw cash from ATMs. Cardless ATM transactions use a code and a mobile phone for authentication … Read moreCardless ATM transactions and thieves–3/11/2019

Anatomy of a PHISH and the use of Social Engineering 12/14/2018

Anatomy of a PHISH and the use of Social Engineering   PHISH is defined as a method of getting you to provide credentials or otherwise profit the originator of the email independent of who is harmed. Social Engineering is roughly defined as manipulating you to do some one else’s bidding but having you think it … Read moreAnatomy of a PHISH and the use of Social Engineering 12/14/2018

Students Beware of Email Scams–Lt. Paul Verrillo, Wesleyan Public Safety 10/22/2018

Students Beware of Email Scams We have seen a recent uptick in email scams targeting students. There have been emails sent to advertise Personal Assistant jobs or Internship possibilities. Typically these emails are not sent from a Wesleyan email address. Resumes and replies asked for in the emails are not sent to a Wesleyan email … Read moreStudents Beware of Email Scams–Lt. Paul Verrillo, Wesleyan Public Safety 10/22/2018