Kansas State University

search

IT News

Category: Cybersecurity

How’s your Cyber hygiene?

Cyber hygiene is the practice and steps K-Staters can follow to improve our online security and maintain the health of our IT systems.

Cyber hygiene is often compared to personal hygiene. Just as you follow daily personal hygiene practices to stay healthy, adopting a daily cyber hygiene routine is crucial for safeguarding the health of K-State’s network and ensuring the safety and security of our data. By making these habits a part of your daily routine, they will become second nature.

Be aware of phishing scams. Cybercriminals use phishing scams to try to trick you into sharing personal information, such as passwords, credit card numbers, social security numbers and bank account numbers, by sending you fraudulent emails or directing you to a fake website. Learn what a phishing scam looks like.  If you suspect that you have been compromised…” use something like “If you suspect you’ve been targeted or fallen victim to a phishing scam, report the incident immediately to abuse@ksu.edu.

Create strong passwords. Complex passwords can prevent many malicious activities and protect K-State’s network. Consider using passphrases or a reputable password manager to create and store complex passwords securely. Learn about K-State’s eID password requirements. Continue reading “How’s your Cyber hygiene?”

Avoid Phishing Scams with Three Simple Tips

""Phishing scams are messages designed to look like they’re from a trusted source. You may open what you thought was a safe email, attachment or image only to find you have been exposed to malware or a scammer looking for your personal data. You can take precautions to protect your data. Be aware of the signs and report phishing to protect devices and data.

Recognize the common signs

  • Urgent or emotionally appealing language.
  • Requests to send personal or financial information.
  • Unexpected attachments.
  • Untrusted shortened URLs.
  • Email addresses that do not match the supposed sender.
  • Poor writing.

Resist and report

Think before you click. More than 90% of successful cyberattacks start with a phishing email. If you receive a suspected phishing email, immediately report the email to abuse@k-state.edu.

Delete

Delete the message. Don’t reply or click on any attachment or link, including any “unsubscribe” link. The unsubscribe button could also carry a link used
for phishing. Just delete.

If a message looks suspicious, it’s probably phishing. But even if there’s a possibility it could be real, don’t click any link, attachment or call any number.
Look up another way to contact a company or person directly: Go to a company’s website to find their contact information. Call the individual at a known number and confirm whether they sent the message

4 tips to stay safe online

Our online world needs to be protected. There are easy things we can
do to ensure our information is safe from those wishing to steal it.

Recognize & report phishing

Most successful online intrusions result from a recipient of a “phishing”
message accidentally downloading malware or giving their personal
information to a spammer. Do not click or engage with these phishing
attempts. Instead, recognize them by their use of alarming language
or offers that are too good to be true.

Report the phish and delete phishing messages.

Use strong passwords

Simple passwords can be guessed. Make passwords at least
16 characters long, random and unique for each account.
Use a password manager, a secure program that maintains
and creates passwords. This easy-to-use program will store
passwords and fill them in automatically on the web. Continue reading “4 tips to stay safe online”

Tips for protecting your devices and personal information

You use devices like laptops, smartphones, tablets and watches to store sensitive information like your credit card. Protecting and securing that information is important to safeguarding your identity and data.

Here are a few things you can easily do to protect your devices.

Install antivirus software

Antivirus software is your first line of defense. It detects, blocks, and removes viruses and warns about dangerous websites and links.

Use strong passphrases/password manager

Using long, complex and unique passwords is a good way to prevent your account from being hacked. An easy way to keep track of and remember your passwords is by using a password manager. Continue reading “Tips for protecting your devices and personal information”

Antvirus required for all devices connecting to the K-State network

""Kansas State University is committed to maintaining the highest level of cybersecurity for our community. To strengthen our defenses, all devices connecting to K-State’s network must have antivirus software installed and kept updated.

CrowdStrike is the antivirus solution for university-owned devices. It is not licensed for personal use. For antivirus protection on personally-owned devices, see the options below.

Installing CrowdStrike

CrowdStrike Falcon is automatically installed on all Windows domain-joined computers. For Mac OS systems or specific non-domain-joined Windows machines, you can manually install CrowdStrike Falcon by following these instructions.

Personally-owned devices

Personal-owned devices are still required to use an antivirus solution and keep it updated when connecting to the K-State network. This ensures the safety and integrity of our network and the personal information of all our users.

The following are antivirus solutions for personal use:

  • Windows
    • Windows Defender (built into Windows 10 and Windows 11)
    • Avast Free Antivirus
    • AVG Antivirus Free
  • Mac OS
    • Avast Security for Mac
    • Sophos Home

If you have any questions, contact the IT Service Desk at 800-865-6143 or 785-532-7722 or via Live Chat. For in-person support, come to the IT Service Desk on the second floor of Hale Library.

Protect yourself from ransomware: What you need to know

""Ransomware is malicious software that locks your data or your entire device and demands a ransom to unlock it. Cybercriminals may promise to return your files if you pay, but there’s no guarantee they’ll follow through. 

How Does It Spread? 

Ransomware often comes through phishing emails, malicious websites, or infected downloads. You might think you’re clicking a harmless link or attachment, but once you do, the ransomware installs itself and begins encrypting your files. 

At K-State, we’ve seen an increase in phishing attempts targeting students, faculty, and staff. Our Security Intelligence and Operation Center (SIOC) is actively monitoring these threats, but individual vigilance is critical to protect personal and institutional data. 

How Can You Protect Yourself?  Continue reading “Protect yourself from ransomware: What you need to know”

How to identify CEO fraud

CEO fraud is when cybercriminals attempt to impersonate senior executives to deceive employees into transferring funds or sensitive information.

These fraudsters target specific employees with personalized emails, usually asking their victims to complete a business activity such as paying a bill. They learn as much as possible about their targets and organization to make the emails more convincing. They can obtain this information from websites and social media sites. For example, LinkedIn provides them with a plethora of information about a target, such as job history, connections with colleagues and even samples of how they write. Continue reading “How to identify CEO fraud”

K-State utilizing geolocation for cybersecurity

""The internet is an incredible tool for learning and sharing information, but it also poses a cybersecurity threat. To prevent hackers from stealing your personal information, K-State uses geolocation to protect accounts from being compromised by using IP information. If any suspicious activity is detected, the user will receive an email notification with recommendations on the necessary next steps, which may include updating account passwords.

Continue reading “K-State utilizing geolocation for cybersecurity”

Duo: Remember me for 7 days feature

K-State uses Duo two-factor authentication to keep your personal information safe. This provides a second layer of security for your account by requiring a secondary device to verify your identity. Duo ensures that only authorized users can access your account, even if they know your password. All K-State students, faculty and staff are required to use Duo. Continue reading “Duo: Remember me for 7 days feature”

Spot the scam: how to stay safe online

""Social media has become a central part of many of our daily lives which makes it a prime target for scammers to carry out their fraudulent activities. One step to protect yourself is by staying aware of their scam tactics such as fraudulent ads, fake giveaways, romance scams and more.

The following are some tips to help you stay safe online:

  • Watch for red flags in messages – Scammers often send messages that look like they’re from someone you know or trust. These messages might ask for personal information, like your password, Social Security number, banking details or try to get you to click on a suspicious link.Be cautious if:
    • You receive unsolicited messages or friend requests from people you don’t know.
    • The message seems urgent or too good to be true.
    • The person asks for money, especially through gift cards or wire transfers.
    • The language or tone doesn’t sound like the person you know.
  • Be suspicious of unverified accounts – Before you trust a profile or page, check for verification. Official accounts often have a verification badge—a blue checkmark on platforms like Facebook or X (formerly Twitter). Scammers sometimes create fake accounts that look almost identical to real ones. Look for these signs of a fake account:
    • The username or handle is slightly off (e.g., extra letters or numbers).
    • The account has few followers or posts.
    • The content is repetitive or copied from other sources.
  • Question unsolicited offers – If you receive an unexpected offer for a prize, job, or investment opportunity, proceed with caution. Scammers often lure victims with promises of easy money or amazing deals.
  • Avoid clicking suspicious links – Links in posts, messages, or ads can lead to harmful websites designed to steal your information. These sites might look like real ones but will ask you to log in or enter sensitive information. Protect yourself by:
    • Hovering over links to see where they actually lead before clicking.
    • Avoiding links that shorten or obscure the real destination.
    • Only logging in to websites by typing the URL directly into your browser.
  • Don’t share too much personal information – Scammers can use your publicly shared information to target you more effectively. Be careful about what you post on your profile and in your posts. Limit the personal details you share, such as:
    • Your phone number, address, or email.
    • Information about your family, like your mother’s maiden name.
    • Details about your daily routines or travel plans.

Stay safe, and think before you click!