In collaboration with the Clermont Historical Society, our award-winning video explores how phishing attacks might have been executed in 1874 in Clermont, Florida. This video reinforces many of the crucial cybersecurity concepts we've covered in our training and introduces several new ones:
- Impersonation Tactics: Hackers often impersonate high-ranking officials such as the College President, Vice-Presidents, and Deans, knowing that employees are likely to respond promptly to requests from these individuals.
- Building Rapport: Hackers may attempt to establish a relationship or rapport to make you more inclined to share personal information. They might exploit your humanistic instincts for their benefit. Guard your information fiercely.
- Deceptive Company Names: Hackers create names of companies that closely resemble your bank's name, business name or company you do business with such as Amazon. If prompted to verify your credentials, open a new browser window, navigate to the site (using Https in the URL name) and then login. Never click on an embedded link that claims it will redirect you to that site.