Skip to Main ContentSearch Site

Cyber Safe

Have you heard about 'smishing'? 

Smishing is a form of phishing that uses mobile phones as the attack platform. The criminal executes the attack with an intent to gather personal information, including social insurance and/or credit card numbers. Smishing is implemented through text messages or SMS, giving the attack the name “SMiShing.” To learn more click smishing

When in doubt...don't click!

PhishingCartoonThe Internet gives you virtually unlimited access to information and services; however, you must be very careful.  You may unintentionally put institutional data at risk and leave yourself vulnerable to online scammers, hackers, and identify thieves.

Email is the most used attack vector for scams, phishing, and malware attacks; they typically include a link that is activated when clicked on by the recipient.  Scammers have been known to use emails that look very similar to one of your friends or colleagues emails; if you receive an email from a known source that seems "odd," check the address the email was sent from.  It might be [email protected] (instead of  

Spotting and Protecting Yourself from Scams

Cybersecurity Best Practices

DUO - CCRI's Two-Factor Authentication (2FA)

2FA is an extra layer of security used to make sure that people trying to gain access to an online account are who they say they are. First, a user will enter their username and a password. Then, instead of immediately gaining access, they will be required to provide another piece of information. This second factor could come from one of the following categories:

  • Something you know: This could be a personal identification number (PIN), a password, answers to “secret questions” or a specific keystroke pattern
  • Something you have: Typically, a user would have something in their possession, like a credit card, a smartphone, or a small hardware token
  • Something you are: This category is a little more advanced, and might include biometric pattern of a fingerprint, an iris scan, or a voice print

With 2FA, a potential compromise of just one of these factors won’t unlock the account. So, even if your password is stolen or your phone is lost, the chances of someone else having your second-factor information is highly unlikely. Please click here for more information about DUO.