E-mail Phishing Simulations Return

AnitPhish (Anti-Phishing Campaign)Phishing attempts – email messages sent by hackers pretending to be your friends, coworkers, or trusted companies – have wreaked havoc across the Internet for years. These messages try to lure you into revealing personal info like passwords and financial information, and their alarmist tone can be deceiving.

Over the past few years, SMU has worked to make people more aware of these phishing attempts by sending simulated phishing emails. For those falling victim to the phishing attempts Continue reading E-mail Phishing Simulations Return

Fall 2018 Security Report Now Available

OIT Quarterly Security Update (Fall 2018)

Our Fall 2018 edition of the OIT Security Report is now available to the SMU community. In this edition, we discuss how you can safeguard your personal information when using wearables, such as a Fitbit or Apple Watch, so you can track your fitness and keep your privacy. Our CSO discusses when an organization values empowerment, allowing employees to take responsibility for their own result, the organization has a greater chance of succeeding – especially in cybersecurity. Plus, Ms. Security returns with advice on phishing and why you shouldn’t worry about Distributed Denial of Service attacks because OIT does.

To access the report, click the link below.

View Report

Authenticating to Box@SMU is required before viewing or downloading the report.
This report is confidential and not intended for distribution outside the University.

Culture Eats Cybersecurity For Breakfast

Eggo Waffles weren’t always called Eggo Waffles. In the 1950s, in the boom that followed World War II, Americans began a love affair with frozen foods. Frank Dorsa and his three brothers in San Jose California had been running a highly popular mayonnaise business and had expanded into powdered waffle mix, but demand for their mix had started to evaporate. The problem was that making waffles was a lot of work.

Frank was a bit of an inventor, so he created a giant waffle-making machine using a merry-go-round engine and a number of electric waffle irons. Thousands of waffles were frozen and shipped every day. But the name, the “Froffle,” was a flop. Instead, customers called the waffles as “Eggos,” referring back to the distinctive egg taste of the Dorsa brother’s mayonnaise. The name, like the waffles, stuck around.

The Kellog’s Company bought the Eggo waffles line in 1968, and four years later they introduced the slogan “L’Eggo My Eggo.” The marketing campaign would be one of the most successful of all time, continuously running for 36 years. The commercials depicted kids and parents in an escalating struggle to maintain possession of their precious frozen waffles. The message was clear: the waffles were so good, if you weren’t careful, someone might steal them from you. Continue reading Culture Eats Cybersecurity For Breakfast

Summer 2018 Security Report Now Available

OIT Spring 2018 Security Report

Our Summer 2018 edition of the OIT Security Report is now available to the SMU community. In this edition, we show you how nearly everything that happens when you use a computer is written to a log on your computer or a server somewhere, discuss the new European privacy law called the General Data Protection Regulation, or GDPR, see how you can bring a Security Minute to your next meeting, plus more advice from Ms. Security.

To access the report, click the link below.

View Report

Authenticating to Box@SMU is required before viewing or downloading the report.
This report is confidential and not intended for distribution outside the University.

Spring 2018 Security Report Now Available

OIT Spring 2018 Security Report

Our Spring 2018 edition of the OIT Security Report is now available to the SMU community. In this edition, we show you how you can use Cylance at home, discuss the death of privacy, see how new technologies in the SMU PD command center are helping to keep the campus safe, plus more advice from Ms. Security.

To access the report, click the link below.

View Report

Authenticating to Box@SMU is required before viewing or downloading the report.
This report is confidential and not intended for distribution outside the University.