As online threats become more sophisticated, it’s important that our knowledge does too. That’s why we want to remind everyone that cyber security doesn’t have to be complicated. Staying ahead of evolving threats by increasing our knowledge goes hand in hand with building cyber safe habits. It’s often the small actions you take like thinking twice before clicking a link or downloading a file that can help keep you safe in the long run.
We encourage you to get familiar with the signs of phishing, malware, and AI-powered scams. Specifically, how to identify the signs of a phishing message, suspicious files, downloads, how to report them, and how cyber criminals are using AI to make their scams more believable.
Your awareness checklist for this message includes:
- ✅ How to spot phishing, vishing, and smishing messages
- ✅ How you can report a phishing email using Outlook
- ✅ Choosing anti-virus software that works for you
- ✅ How to report suspicious texts to 7726 (SPAM)
- ✅ Recognizing and avoiding malware and ransomware
- ✅ Downloading safely and using trusted sources
- ✅ Understanding how AI is being used by cyber criminals to make their scams more believable
- ✅ Knowing how to spot the signs of AI-generated scams and misinformation
Phishing
Phishing messages are specifically crafted to look and feel like they are from an organization that you already know and trust – but they are not legitimate e-mails. They are sent by a cyber-criminal trying to gain access to your computer, online accounts, or steal your personal information. Phishing is one of the most common threats you will encounter online. Luckily, phishing message can be easy to spot – if you know what to look for…
Review this presentation for tips on what to look for: The 7 Red Flags of Phishing
Vishing
Vishing is a type of phishing attack that involves scammers using phone calls to trick people into sharing sensitive information. The term is short for “voice phishing”. Scammers may impersonate a bank, credit card company, or other financial institution to gain unauthorized access to accounts. They may claim there is suspicious activity and ask for account details and login credentials.
Here are some common signs of a vishing attack:
The call starts with a pre-recorded message
The call starts with an awkward long pause while the scammer prepares to take the call
The caller creates a sense of urgency
The caller pressures you for answers
The caller asks for sensitive information, such as passwords or credit card numbers
The caller offers you something that is too good to be true
The call is of poor audio quality
Prize Alert – What is the 4th Red Flag of Phishing? Email your answer to cyber-month@flemingcollege.ca for a chance to win a $100 Best Buy Gift Card. This week’s draw closes at 11:59 p.m. Wednesday, October 29th.
Anti-virus / Malware Protection
Malware, (short for malicious software), is one of the oldest and best-known cyber threats. A virus is one type of malware. Ransomware falls into this category. Anti-virus (AV) software has been around for decades and is still one of the best ways to protect yourself from ever evolving and sophisticated forms of malware.
Malware can come from many different places. The most common include:
Malware can spread from one device to another to steal, damage or delete any data it can access. It can be difficult to spot malware on your device. Here are some signs that your device might be infected with malware:
Artificial intelligence (AI) generated content
✅ Learn about: Online Disinformation
✅ Learn about: The Dangers of AI Art and Deepfakes
REMEMBER
Be careful with attachments – Don’t open files or click links from unknown senders!
Identity theft and protecting your digital identity
Your digital identity is an online record of your personal information. It could include something as simple as your email address or social media account, or more sensitive information like your social insurance number (SIN), passwords and even your financial information.
✅ Protect your Digital Identity
Social Media Safety
For many of us, it has become an everyday practice to share aspects of our personal lives on social media , through pictures of our pets or posting birthday wishes to our loved ones. But just like on other platforms, cyber threats, like phishing scams, exist on social media. It’s important to remain vigilant when connecting with people through social media, whether we know them in real life or not.
✅ Learn how to practice safe social
Did you know?
✅ Job opportunities and postings for on-campus student work are only ever posted to the Evolve Applicant Portal maintained by the Fleming College Human Resources department. Fleming College never sends mass communications about specific job postings. Refer to the Fleming College Career Services page for assistance with student employment at the College or elsewhere.
✅ Grants or bursaries notices will only be sent by our Financial Aid office (FinAid@flemingcollege.ca) or Advancement & External Relations department (alumni@flemingcollege.ca).
✅ You can Report a Security Incident If you suspect your Fleming account or password has been compromised.
✅ Microsoft Defender Antivirus comes free with Windows 10 & 11, and there is also a paid subscription version available for Mac, iOS and Android devices.
For more information, contact:
IT Service Desk
1-866-353-6464 x4111 Option #1