Below are phishing attempts, DO NOT REPLY TO THESE MESSAGES AND DO NOT CLICK ON ANY LINKS OR DOCUMENTS ATTACHED TO THESE EMAILS.
- Follow up 2/11/2019
- Favor 02/06/2019
- Benefits Open Enrollment Issue 2/4/2019
- Urgent reply 01/29/2019
- Found a broken link on your page 01/24/2019
- URGENT REPLY 01/17/2019
- Urgent reply 01/17/2019
- Favor 01/16/2019
- URGENT REPLY 01/16/2019
- Hello are you on campus now 12/18/2018
- Are you available? 12/12/2018
- (Attention Required)- Please Read Immediately 12/05/2018
What is Phishing?
Phishing: The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Identify theft can be devastating to the victim and is difficult, costly, and time-consuming to fix.
Our email service is through Google Apps for Education and individual email storage capacity is 25 GBs; therefore, the likelihood of running out of email storage is extremely low.
To help the Lawrence Tech community recognize a legitimate email message, please remember:
- Messages sent from Lawrence Tech IT Services will always be signed by name.
- You will never be asked to send personal information in an email message.
- Any email message which indicates that you are over your email storage quota is almost always a phishing attempt.
There are many web sites which can help explain phishing tactics and what you can do to protect yourself. For more information, look at these sites:
Microsoft System Center Endpoint Protection
All University laptops and desktops have Microsoft System Center Endpoint Protection (SCEP) anti-virus software installed. SCEP runs anti-virus scans and updates virus definitions on each system automatically.
Users with Lawrence Tech laptops or desktops do not need to do anything to configure or manage SCEP software.
If you have other questions about SCEP, please contact the Lawrence Tech Computer Help Desk by phone at 248.204.2330 or by email at firstname.lastname@example.org.
One of the most important ways to secure your data and protect your personal information is to know how to create and use strong passwords. Using strong passwords and changing them regularly can help keep you safe from attackers who try to access your accounts by guessing or cracking your passwords. A strong password is difficult to guess, has 8 or more characters, isn't a word in the dictionary (regardless of language), and includes numbers and special characters.
How to create strong passwords
If you need help creating a strong password, here are some suggestions:
- Pick a phrase you can easily remember. Use the first or last letter of each word and put it together for a password. For example: Lawrence Technological University: Theory and Practice since 1932 password would be: ltu:taps1
- Capitalize some of the letters: hAveAGooDDay
- Use numbers in place of vowels: secr1tP4ssw0rd
- Remove some letters from a word or misspell it intentionally: Xpearimntl
- Include special characters: what_t!me?izit
Good password practices
Remember to guard your identity and data by following these practices:
- Don't share your password with anyone. It's a violation of Lawrence Tech Computing policy to share your username and password information with anyone.
- Don't store passwords on your computer, have your browser remember them, or leave them written on pieces of paper around your computer.
- Use different passwords for different systems. Don't use the same password for every website and account you have. If you use the same password for all your accounts and it's compromised, then all your accounts are compromised.
- Don't create passwords using personal information like birthdays, names of children, pets, phone numbers, or addresses. Social networking sites make your personal information widely available and your password may be easy to guess.
- Make your passwords really long. The longer a password is, the harder it is to crack.
- Change your passwords regularly.
- Change your password after international travel and after using a non-secure network.
Are you using one of the ten most popular passwords?