Skip To Main Content

Cybersecurity Current Events & Tips

Cybersecurity Tips

The Red Flags of Rogue URLs

The PDF found above is a short list of tips to spot malicious URLs. This is a difficult trick to spot, so any advice to make it easier is welcome. A common example of this would be the URL: Malicious Legitimate

In the above example, a lowercase r and n are used to form the m in America. With more clustered or smaller fonts, this difference can be difficult to spot.

KnowBe4's Red Flags

The linked PDF contains tips from KnowBe4 on how to spot attempts at Social Engineering. The 22 tips found here are an easy test to determine if an email might be a phishing attempt.

  • Phishing
  • Tips
What is it?
Multi-factor Authentication (MFA) is a process for verifying yourself when logging in to a device or account. Most devices use single-factor authentication, a simple password for logging in. Today, single-factor isn't always enough to prevent unauthorized users from gaining access. MFA allows for a more secure login by requiring what are called "Identity Claim Factors". 
There are three types of Identity Claim Factors:
  1. Something You Own: This factor is a device in your possession, either a small code generator, an application on your phone, a text to your mobile device, or a call to your mobile or work phone. This factor provides a code to one of these devices in your possession which is used as part of your login. This factor has an intended code to be used, and applications can show multiple and ask that you to select the code shown on the device you are trying to access. 
  2. Something You Know: This is something you've memorized or stored somewhere, such as a PIN code. You must supply the correct PIN to log in on the device or service. 
  3. Something You Are: This factor is something about your physical body that can't be altered, such as a fingerprint or retina. Biometric scanners or readers can be used to physically confirm you are who you claim to be. 
​Why do I need it?
In our digitally driven world, passwords are no longer enough to keep information safe. Today, it takes little effort for a hacker to break in, or social engineer their way into, accounts that only use single-factor protections. Any additional steps to access your accounts, such as an authentication code, would mean hackers need access to your phone as well. 
You can create an additional layer of security and make your data more secure by using two-factor or multi-factor authentication. Consult your IT Help Desk to see if there's a preferred method for MFA.
  • Authentication
  • MFA
  • Tips