Search5 Results
- Knowledge Base
- Cybersecurity
Learn what actions you should take to protect your accounts and report the incident.
- Knowledge Base
- Cybersecurity
- Phishing, Spam, & Compromised Accounts
Although your first instinct may be to ignore or delete suspicious emails, we recommend that you report them to our security team. IT will examine the email and advise you of any further steps you may need to take.
- Knowledge Base
- Cybersecurity
A compromised account is one accessed by a person not authorized to use the account.
- Knowledge Base
- Cybersecurity
- Phishing, Spam, & Compromised Accounts
Phishing attacks and other email scams take advantage of personal and professional relationships, organizational hierarchies, and human curiosities — information that is now readily available through social media and professional networking websites.
- Knowledge Base
- Cybersecurity
- Phishing, Spam, & Compromised Accounts
Spear phishing is a form of phishing that targets people. Request gift cards is a common tactic among spear phishers.