{"id":56573,"date":"2022-08-01T14:54:00","date_gmt":"2022-08-01T18:54:00","guid":{"rendered":"https:\/\/www2.stetson.edu\/law\/docket\/?p=56573"},"modified":"2022-07-26T08:43:56","modified_gmt":"2022-07-26T12:43:56","slug":"security-awareness-and-phishing-simulations-at-stetson-10","status":"publish","type":"post","link":"https:\/\/www2.stetson.edu\/law\/docket\/security-awareness-and-phishing-simulations-at-stetson-10\/","title":{"rendered":"Security Awareness and Phishing Simulations at Stetson"},"content":{"rendered":"\n<p>Phishing emails, texts, and phone calls continue to be a threat we face nearly every day. Every week we hear about a city, company, or state that has been a victim of ransomware, and in every case, phishing was the catalyst. Even though we block millions of malicious emails daily, phishing emails are the most significant security risk we face. That is why Stetson chose to perform simulated phishing tests to empirically gauge the phishing risk within our institution.<\/p>\n\n\n\n<p>Since we began these tests, the phish prone rate has been reduced by almost 50% thanks to the awareness and efforts of each of Stetson\u2019s staff and faculty. We have been asked, \u201cwhy do we perform these tests?\u201d and the reality is, if we don\u2019t, hackers will. Hackers will send you the most realistic email to trick you at the worst possible times because they have no rules and have nothing to lose.<\/p>\n\n\n\n<p>During this time of working from home, we all need to be extra vigilant, careful of the risks, and watchful for phishing threats. The vendor we use, KnowBe4, has put together an <a href=\"https:\/\/vimeo.com\/402248858\">excellent video<\/a> to raise awareness.<\/p>\n\n\n\n<p>Here is a short list of work-from-home security best practices.<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li><strong>Keep your computer up to date<\/strong>. Ensure your operating systems automatically update, and check for updates for your applications (Office, Adobe, etc.).<\/li><li><strong>Run antivirus<\/strong> on your home computer (Windows and Mac).<\/li><li><strong>Reset your default wifi router password<\/strong> (\u201cPassword\u201d is not a strong password) if you are using a wireless router like Linksys, Asus, Netgear (most wireless routers from the internet service provider have strong passwords.)<\/li><li><strong>Use password managers<\/strong> (like LastPass) to save your passwords and create unique passwords for your accounts.<\/li><\/ol>\n\n\n\n<p>If you suspect something suspicious, whether it is an email, text, phone call, or computer activity, please contact I.T. at <a href=\"mailto:it@law.stetson.edu\">it@law.stetson.edu<\/a> or 727-562-7323.<\/p>\n\n\n\n<p>Regards,<br>Information Technology Department<br><strong>STETSON UNIVERSITY College of Law<\/strong><br>1401 61st Street South | Gulfport, FL 33707<br><strong>Email:<\/strong> <a href=\"mailto:william.delgado@law.stetson.edu\" target=\"_blank\" rel=\"noreferrer noopener\">it@law.stetson.edu<\/a>&nbsp; | <strong>Office:<\/strong> +1 (727) 562 7323<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing emails, texts, and phone calls continue to be a threat we face nearly every day. Every week we hear about a city, company, or state that has been a [&hellip;]<\/p>\n","protected":false},"author":80,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9,10],"tags":[],"class_list":["post-56573","post","type-post","status-publish","format-standard","hentry","category-faculty","category-staff"],"_links":{"self":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/56573","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/users\/80"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/comments?post=56573"}],"version-history":[{"count":1,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/56573\/revisions"}],"predecessor-version":[{"id":56574,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/posts\/56573\/revisions\/56574"}],"wp:attachment":[{"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/media?parent=56573"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/categories?post=56573"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.stetson.edu\/law\/docket\/wp-json\/wp\/v2\/tags?post=56573"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}