Update, Reboot, Stay Secure

Information Security

Mission Statement

The Information Security Office is committed to lowering the risk profile of the University’s electronic information by implementing industry best practices to protect the confidentiality, integrity, and availability of student, faculty, and staff information. We uphold the University’s compliance obligations by developing information security policies, providing security awareness training, and overseeing the implementation of strategic information security initiatives.

Scam of the Week

Don't Reward These Scammers

In this week’s scam, cybercriminals are targeting Verizon customers. Verizon is a cellular service provider that recently experienced a major network outage. You receive a text message that appears to be from Verizon, claiming you have expired reward points to redeem. The text includes a link and urges you to select it immediately to claim your points. You may think this message is related to the recent network outage and be tempted to follow the instructions.

However, this is actually a smishing, or text phishing, scam! Cybercriminals are exploiting the recent news stories about a mobile outage to trick you. If you select the link in the message, you will be taken to a fake website and asked to enter your financial information to redeem your reward. But if you enter your banking details, the scammers will steal them!

Follow these tips to avoid falling victim to a smishing scam:

  • Never select links in unexpected texts, even if the message appears to be from an official source, such as your mobile carrier.
  • If you want to check whether you really have an account credit or reward, open the official Verizon app on your phone or log in to their official website.
  • Be very suspicious if a website asks for your credit card number or bank details to issue you a credit or reward.

 
View More
 

Time It Takes a Hacker to Brute Force Your Password in 2023

Number of Characters Number Only Lowercase Letters Upper and Lower Case Letters Numbers, Upper and Lowercase Letters Numbers, Upper and Lowercase Letters, Symbols
4 Instantly Instantly Instantly Instantly Instantly
5 Instantly Instantly Instantly Instantly Instantly
6 Instantly Instantly Instantly Instantly Instantly
7 Instantly Instantly Instantly Instantly Instantly
8 Instantly Instantly Instantly Instantly 1 sec
9 Instantly Instantly 4 secs 21 secs 1 min
10 Instantly Instantly 4 mins 22 mins 1 hour
11 Instantly 6 secs 3 hours 22 hours 4 days
12 Instantly 2 mins 7 days 2 months 8 months
13 Instantly 1 hour 12 months 10 years 47 years
14 Instantly 1 day 52 years 608 years 3k years
15 2 secs 4 weeks 2k years 37k years 232k years
16 15 secs 2 years 140k years 2m years 16m years
17 3 mins 56 years 7m years 144m years 1bn years
18 26 mins 1k years 378m years 8bn years 79bn years

 

  Latest News
QR Code Phishing - 'Quishing'
QR Code Phishing - 'Quishing'
Saturday - September 20, 2025
Malicious QR Codes are being utilized by cyber threat actors to exploit growing trust in QR code technology.
Read more
Phishing Click Rates Triple in 2024
Phishing Click Rates Triple in 2024
Wednesday - January 8, 2025
The rate at which enterprise users clicked on phishing lures nearly trebled in 2024, according to new research by Netskope.
Read more
The Most Dangerous Pop Culture Passwords in 2024
The Most Dangerous Pop Culture Passwords in 2024
Monday - June 3, 2024
In a world where over 2,200 cyberattacks are made per day, passwords are an internet user's baseline defense against digital ne'er-do-wells.
Read more