IT Security icon

IT Security

PII Protect Security Awareness Training Program - Frequently Asked Questions

Frequently Asked Questions To help with your PII Protect training journey, here are the answers to a few of the most frequently asked questions when using the Y's PII Protect security awareness training program. Why Should I Take a Cybersecurity Course? We can’t go a week without hearing about th...

What is Ransomware?

RANSOMWARE is a type of malware that threatens to publish the victim's personal data or permanently block access to it unless a ransom is paid off. While some simple ransomware may lock the system without damaging any files, more advanced malware uses a technique called cryptoviral extortion. It ...

Phish Bowl - What is Phishing?

Phishing uses legitimate-looking emails or fraudulent websites to encourage you to give up your personal data or information, such as social security numbers, credit card numbers, passwords, etc. It is an attempt to acquire sensitive information about you and could lead to identity theft.It is im...

Facebook Messenger Scam / Phishing

Attacks can happen not only from email. Social media and messaging apps can also fall prey to malicious actors. Appears our Facebook users have been hit with attempts like below on Facebook Messenger. This message looks legit from Meta but it attempts to get you to click a bad link. Be vigilant!

Gift Card - Scam

You may receive an email, phone call, or voicemail asking that someone even the CEO is asking for gift cards to be purchased. They then state they need the codes sent to them. This is a scam. As an organization, we do not purchase gift cards any longer to hand out. If you are asked to purchase...

Phish Bowl - What is Whaling

Whaling is a highly targeted phishing attack - aimed at senior executives - masquerading as a legitimate email. Whaling is digitally enabled fraud designed to encourage victims to perform a secondary action, such as initiating a wire transfer of funds.Whaling emails are more sophisticated than ge...

How to setup Google MFA (Multi Factor Authentication)

Setting up Multi-Factor Authentication (MFA) with Google is a straightforward process. Here's how you can set it up: Sign in to your Google Account: If you haven't already done so, visit the Google Account page (https://myaccount.google.com/) and sign in with your credentials.   Go to Security...