fbpx
North Central State College North Central State College

NC State Cyber Awareness Training

Student Login Information (PDF), opens in a new windowProceed to Microsoft Office 365 login, opens in a new window

Cyber threats are real and can cause a financial loss, identity theft, or loss of personal data.  They can target your email accounts, social media applications, and even your phone.

You can significantly reduce your chance of becoming a victim to cyber threats by being aware and informed.

NC State College is providing Cyber Awareness Training to all of its students and employees.

Please take a moment to review these tips.

Safe email rules!

  • All spam/phishing emails want you to take action!
  • Think before you open an email! Is it from a trusted source? Are you expecting it?
  • Mouse over links to see where it is going before clicking on it.
  • Never give your username and password or login from links in emails or attachments.
  • On Personal devices, make sure operating system & antivirus is up to date
  • Never open suspicious mails
  • When in doubt, give IT a shout!  Report all suspicious emails to the IT Service Desk helpdesk@ncstatecollege.edu

Cyber Awareness Tips!

  • Phishing is a type of fraud in which a hacker attempts to gather personal information or credentials by impersonating a legitimate brand and sending users to a malicious website.

    Spear phishing is an email or electronic communications scam targeted towards a specific individual, organization or business.

  • Microsoft #1 Phished Brand
    • O365 combines email, file storage, collaboration, OneDrive, SharePoint – all contain sensitive data.
    • With a single set of legitimate Office 365 credentials, a phisher can conduct spear phishing attacks from within the organization and impersonate employees trying to trick the user to click on a link and give their information.

    O365 Attack Types

    • Action Required Attack – message includes a link and requires you to validate your account. Picture looks like a real O365 login screen
    • Shared File Attack – you receive a SharePoint or OneDrive file-sharing email from a common name or from someone in our college that has a “Go to Folder” link, or something similar from the “SharePoint Team” that requires you to login once you login.

    • NEVER TRUST AN EMAIL BASED SOLELY ON SENDER!
    • Display name spoofing- looks like it is from someone you know with a legitimate company name as the sender, but underneath is a random address. WHEN VIEWED FROM MOBILE PHONE SENDERS REAL ADDRESS IS HIDDEN.
    • Cousin Domain – looks identical to a legitimate email address but slightly altered. Apple.com – apple.co, other Apple examples: apple-support.org, apple-logins.net… Look carefully at the domain!

  • Cyber Threat Emails:

    • May promise something like a free iPhone to the first respondents.
    • May threaten and try to make you take immediate action using a scare tactic.
    • Can impersonate HR staff, or other college staff and ask you to click on link. Examples: Payroll has changed login to secure, direct deposit asking you to change where you are currently having your check deposited.

    • Attacks used to be sent in bulk to a group with “dear customer” or generic greeting.
    • Today’s phishers are including the victim’s name in the subject line and prefilling the victim’s email address on the phishing web page.

    • STUDENTS & EMPLOYEES NEED TO READ EMAILS CAREFULLY AND NOT JUST SKIM!
    • Many phishing & spear phishing attacks are launched from other countries and have cleaned up the grammar and spelling issues that were telling signs of phishing.
    • May use “boxes” to click on that say “go to”, “info”, etc., instead of an underlined link.

    • Every phishing email includes a link, but phishing links are deceptive and set up to “LOOK” like an official webpage for your bank etc.
    • Link in text might say “go to Office 365 account” the URL takes the user to a phishing page designed to look like Microsoft.
    • Roll over all links before clicking on them to see the pop-up that displays the real destination.

    • To avoid detection, hackers will include a phishing link as an attachment such as a PDF or Word Doc.
    • The email itself will appear to be from a legitimate business, vendor, or colleague, asking you to open the attachment and click on the link inside.

    • Brand logos and trademarks  are no guarantee the email is real.
    • Images are public and can be downloaded by hackers to persuade victims into thinking email is from legitimate source.
    • Examples are: Amazon logo, your bank logo, O365 logo, PayPal logo…
    • Roll over links to see if it is legit!

    • All spam/phishing emails want you to take action!
    • Think before you open an email! Is it from a trusted source? Are you expecting it?
    • Mouse over links to see where it is going before clicking on it.
    • Never give your username and password or login from links in emails or attachments.
    • On Personal devices, make sure operating system & antivirus is up to date
    • Never open suspicious mails
    • When in doubt, give IT a shout!  Report all suspicious emails to the IT Service Desk itservicedesk@ncstatecollege.edu

    • Spam relay – sending spam email from your email account
    • IT may need to restrict your account from sending email
    • Entire College Blacklist Risk
    • Your credentials are at risk
    • Possible identity theft
    • Computer & personal data could be held for ransom.Whether you know or you think you clicked on a link:
    • Go to Password Services and change your password immediately!
    • Call the IT Service Desk and let them know what happened.
    • Email the IT Service Desk after hours to report or employees can place an IT ticket through My Services.

    • Identify source – do you know the person it is from?
    • Are you expecting it? If not, and you know the person, contact them to confirm they sent it you.
    • Roll over ALL links and addresses. Do they have extra characters, numbers, or anything unusual?
    • Does the domain look correct & not altered?
      (example: apple.com: apple.org, apple-logins.net)
    • Forward email to the IT Service desk to validate.

    • Take extra caution with reading your email on smart phones.
    • You cannot look at links from a smart phone so it is easier to be fooled.
    • You can accidentally touch the screen where the link is and it will open. Sometimes you do not even know that you clicked on anything.