COVID-19 Information Security Threats
As our University and country respond to the challenges of the COVID-19 (coronavirus) outbreak, cybercriminals are also actively attempting to take advantage. The University Computer Services Center and Information Security Offices want to warn you of the need to be especially vigilant. The following are major areas of concern:
Where to Get Help and Report Incidents
- Students and General Division employees:
helpdesk@6317p.com and/or infosec@6317p.com
Call (251) 460-6161 for highly urgent circumstances, such as an obvious computer infection or ransomware attack.
- USA Health employees:
Call the IT Help Desk at (251) 445-9123 or email hsis.emailreview@health.6317p.com
Work at Home Security Considerations
The transition to work-at-home raises a number of Information Security issues for individuals working at home. We have compiled a number of suggestions you will find helpful in securing your home network environment for personal and University business purposes. Click here for these suggestions.
Email “Phishing” and other Threats
Malicious email phishing scams about the COVID-19 virus are at a heightened level. The Information Security Office is especially concerned about phishing and malware scams taking advantage of fears surrounding the Coronavirus. These phishing attempts may ask you to enter credentials or urge you to open an attachment to learn more, potentially installing malicious code on your machine.
Please take the following precautions:
-
Be skeptical of emails claiming to be from the Centers for Disease Control (CDC), the World Health Organization (WHO), or experts saying they have information about the virus. Find the authoritative web sites for those entities rather than clicking on links in the email.
-
If you receive an unsolicited email which includes a link requiring you to enter passwords, STOP and assess the situation. Contact the sender before acting.
-
Malicious actors are cloning websites with a live map for COVID-19 global cases by Johns Hopkins University. Once the site is accessed, the user is infected with malware.
The USA Information Security Office recommends the following preventive measures:
-
Verify the sender’s email address, but be aware that even a legitimate sender might have been compromised.
-
Unless you are CONFIDENT of the email’s integrity, do not click on any links, or download/open any attachments in any unsolicited emails you may receive - even if from someone you routinely correspond with.
-
Remember, USA will never ask for sensitive information via an unsolicited email.
-
Enable Two Step Verification for your USA email account. See (link to http://azprivacy.6317p.com/services/jagnet/twofactor.html
Social Engineering
Threats
Social engineering is a type of attack that leverages human kindness and may involve impersonating a USA affiliate or asking for information on behalf of one.
-
These methods often create fake situations that appear to be urgent in order to retrieve sensitive information, elevated permissions, or a response that would normally require an approval or verification process to provide.
-
These targeted attacks are commonly observed in phishing emails that request you to perform an action such as download an attached document or click on an embedded link, but can be conducted through other methods such as phone calls, social media, or in person.
Guidance
Given the current environment, it's important everyone remain vigilant and not bypass proper approval channels that would normally be required by your department.
-
Common sense is your best defense
-
Verify the source of all requests before engaging in a conversation
-
Don’t open any unexpected attachments or click suspicious links
-
Be aware of the information being requested and don't give users the 'benefit of the doubt'
-
Ignore unsolicited requests for information or actions
-
Be aware of suspicious individuals, if you see something, say something
-
If your department is responsible for providing services to the USA community and you have questions on your verification processes or policies, please consult your supervisor for additional information.