Articles

Back
                                     Level-Up-Your-Cyber-Defense.jpg
                                     Defending-Against-Trojan-Malware-Countermeasures.png
Navigating-Digital-Safety-A-Compact-Guide-for-Women.jpg

                               Email-Security.jpg

                                        A-Students-Guide-to-Cybersecurity-Protecting-Your-Data.png

Overview

By default, Chrome, Edge, and Firefox browsers automatically download all files to a user’s Downloads folder when saving files from the Internet. This folder resides on the C: drive of a computer (“C:\Users\username\Downloads) and is set by the vendor, but individuals can change this setting.

Sensitive files being downloaded should be stored in a secure location and not in a user’s Downloads folder.

Best practice recommends that staff/users change this setting within their respective browsers and toggle the button to the right to “Ask where to save each file before downloading.” This ensures the user is prompted and can act accordingly by browsing to a secure location (i.e. W: drive) when saving sensitive files.

Details

The following images are screenshots of the setting for each browser where users can enable this.

Chrome:

Click the three dots in the top right corner then click Settings. Click Downloads on the left.

Chrome settings menu with Downloads highlghted

Edge:

Click the three dots in the top right corner then click Settings. Click Downloads on the left.

Edge settings menu with downloads highlighted

 

Firefox:

Click the three horizontal lines in the top right corner then click Settings. Scroll down to Files and Applications.

Firefox settings menu with downloads highlighted

 

Still need help?  Click the 'Purdue IT Request' button to start a ticket.

 

https://service.purdue.edu/TDClient/32/Purdue/KB/ArticleDet?ID=564

Cybersecurity-and-IOT-1.jpg
Cyber-Safe-Holidays-A-Guide-for-University-Students.jpg
Data-Theft---Article.jpg
Vishing_page-0001.jpg
Screen-Shot-2023-08-02-at-1.39.33-PM.png
News-Article---May-1.jpg
Searching-with-Caution-Staying-safe-in-Web.jpg
Tiktok-Article.jpg

Phishing is a form of Social Engineering attack that targets the user to reveal sensitive information like login credentials, Bank details, credit card numbers, etc. It occurs when an attacker, masquerading as a trusted entity, dupes a victim into opening an email, instant message, or text message. The recipient is then tricked into clicking a malicious link, which can lead to the installation of malware, freezing of the system (as part of a ransomware attack), or revealing of sensitive information.

Picture1.png

Email Phishing:

Among many types of Phishing, the most common one is Email phishing. Where the attacker sends a pseudo legitimate mail which will try to fool the user into giving personal information like login information and credit card numbers.

Spear Phishing:

Spear Phishing is more of a targeted type of phishing where the attacker targets a particular person/group. It is a potent variant of phishing, a malicious tactic which uses emails, social media, instant messaging, and other platforms to get users to divulge personal information or perform actions that cause network compromise, data loss, or financial loss

How to Identify Them?

Picture2.png

How to stay safe?

  • Strong Password and 2FA

It is a best practice to have strong passwords which is of:

  • Minimum of 8-40 character length
  • Has both uppercase and lowercase character with one special character and digits

Also, it is advisable to Two Factor Authentication along with strong password where along with username and password verification, an OTP is sent to the registered mobile number.

  • Antivirus:

One best advice to avoid phishing attack is to think twice before giving sensitive information or clicking the links that are sent to us. It is also of best practice to have some good Antivirus software and Firewalls installed in our system to identify such malicious programs that gets installed in case we click some malicious links. Antivirus software will quarantine such malicious software from getting installed in our systems.

Limit the amount of personal information you post :

Be aware of what you post online. Make sure that you do not information such as Address, phone number, and other personally identifiable information that would leave you in vulnerable position

Be wary of strangers :

The internet crawls with may dangerous strangers, it is best to stay vigilant in such websites. Do not share any personal information with stranger whose identity is questionable or appears fake.

Evaluate Sites privacy settings :

The default settings for some sites may allow anyone to see your profile, but you can customize your settings to restrict access to only certain people. There is still a risk that private information could be exposed despite these restrictions, so do not post anything that you would not want the public to see. Sites may change their options periodically, so review your security and privacy settings regularly to make sure that your choices are still appropriate.

Use Strong Passwords :

Protect your account with passwords that cannot easily be guessed. It is a best practice to have strong passwords which is of:

  • Minimum of 8-40 character length
  • Has both uppercase and lowercase character with one special character and digits

Keep Software updated and use Anti-virus software :

We should install software updates so that attackers cannot take advantage of known problems or vulnerabilities. Also it is advisable to have updated anti-virus software installed in our system which will help us detect and protect against virus attacks.

sec.png