Cyber Awareness
Phishing prevention
What is phishing?
Phishing is the act of contacting people via telephone, email or text message while impersonating government or business officials with the intention of stealing private information and data to commit identify theft and financial theft.
Financial spear phishing threats are referred to as finphishing. Read more about this growing threat.
How do I identify a phishing attempt?
- When you receive call, email, or text message, always consider whether they are legitimate.
- If anything looks suspicious, do not open attachments or reply to the message.
- Suspicious email should also be forwarded as an attachment to the Security Operations Centre (SOC) .
What can I do to protect myself against phishing attempts?
- Use email spam filters to block out potentially harmful emails.
- Think before you click on links in messages that appear to be from legitimate senders but are urging you to provide your personal or financial information.
- Use an anti-virus software to help your devices detect malware and phishing attacks.
Password management
What do I need to consider when choosing a password?
- Use a complex password that uses a combination of letters, numbers, and special characters.
- Avoid using information that is commonly known about you (birthday, pet's name, etc.).
- Use a passphrase instead of a password.
- Passphrase: a password made up of multiple words.
What is two-factor authentication?
- Two-factor authentication is an extra layer of security that requires you to verify your identity using a mobile device before allowing you to login.
- Always use two-factor authentication when possible.
What are some password best practices?
- Use different passwords for each account.
- Manage passwords using a password manager.
- Do not save passwords or enter your personal information onto non-secure websites (URLs should begin with https://).
- Learn more about password standards and best practices.
Data security
How do I keep my personal devices safe?
- Install an anti-virus software on your computer to defend yourself against cyber threats.
- Do not store unencrypted files containing personal information such as usernames and passwords on your computer.
- Don't leave your devices unattended in public areas.
- Don't access your bank or work accounts on public computers.
How do I keep my data secure?
- Only use and download software authorized by the University of Waterloo.
- Cloud services (Microsoft 365, Dropbox, iCloud, Google Drive, etc.) should not be used to store sensitive information.
- Learn how to secure your device - Lock it down.