Protect yourself against common attacks
*** Attention iPhone Users read this story about your phone's security. ***
To read about steps you can take to protect yourself against phishing attacks click here.
Read about the data breach at Oracle's MICROS Point-of-Sale Division
This website article is an update on the Oracle MICROS Data Breach.
Click here to read how some of your favorite websites could be vulnerable to serious hijacking attacks.
Read about the latest information about the Democratic National Committee (DNC) email hack.
The following are samples of e-mail messages received by a BGSU account holder. These messages have been reviewed by the ITS Security Team and determined to be fraudulent. If you receive a message similar to the ones displayed as follows, do not respond by providing information, clicking on any provided link or by calling any provided phone number. It is recommended that you delete the message.
Below you will find warning signs and characteristics common of various types of fraudulent email messages. These signs should be considered red flags and are likely linked to scams. Always remember to "think before you click".
Below are common signs of email scams and phishing attempts:
Attackers often send a large number of messages at once. They may have your email address but often do not have your name. Be suspicious of any messages you receive with a generic greeting such as “Dear Customer” or “Attention Account Holder”.
Any legitimate organization will proofread emails prior to sending. Although a professional looking document with no grammar or spelling mistakes may still be a scam, any email from a professional company with multiple grammar and spelling errors is not legitimate.
Example: An email claiming to be from Capital One bank is a scam if it is full of grammar and spelling mistakes.
Be suspicious of unsolicited email messages from individuals that attempt to create a sense of urgency by claiming things such as “your account will be deactivated” or “your account has been compromised”. The attacker is attempting to take advantage of your concern and trick you in to providing confidential information.
***BGSU will never send you an email and ask you to validate your account.***
-Does the sender claim to be from BGSU but the email address ends in something other than @bgsu.edu?
-Does the sender appear to be using a legitimate BGSU account but is not one that you recognize such as “Technology Support Center”.
-Email accounts can be compromised or the sending address can be impersonated even without gaining access to the email account. Does the message come from someone you do recognize, but the content of the message seems out of character for that person?
-If you hover, but do not click, the link, does it show a URL with a domain name that ends in bgsu.edu? (e.g. https://mail.bgsu.edu/ instead of https://bgsu.edu.weebly.com/)
How can you protect yourself if you received an unknown email?
- Do not open any attachments. If you receive an attachment you are not expecting, confirm with the senders that they did indeed send the message and meant to send an attachment.
- Do not click any links provided in these emails (or cut and paste them into a browser). This may download viruses to your computer, or at best, confirm your email address to phishers. If it is a URL you recognize, type it into a browser.
- Do not reply, even if you recognize the sender as a well-known business or financial institution. If you have an account with this institution, contact them directly and ask them to verify the information included in the email.
- Do not enter your personal information or passwords on an untrusted Web site or form referenced in this email.
- Report any suspicious messages that claim to be from BGSU or contain a suspicious attachment or link to email@example.com.
- Delete the message.
What do I do if I think I have been tricked by a phishing message?
- Immediately log into MyBGSU and change your password by clicking on Help Desk in the top right and then Change BGSU Password in the lower left.
- Contact the Technology Support Center and ask to speak with the Information Security Office to discuss how to best respond if any sensitive information may have been exposed.
The following can be considered warning signs of "work from home" scams if:
- they want you to collect and forward money in any way. This may entail involvement in money laundering, losing your own money, or defrauding others. You could be held personally responsible for any forged checks, wire transfers, or illegal money transfers that you handled.
- they want you to receive packages then reship elsewhere. The packaged items have probably been obtained illegally, and the scammers are using you to make the shipping address appear local. Participation could be viewed as aiding fraud.
- they want up-front payment before you can get the job. Most likely there is no job, the scammers are just attempting just to take your money.
- Keep your software up to date
- Don't click on links within emails
- Use free antivirus software
- Back up your computer
- Use a strong password
- Use a firewall
- Minimize downloads
- Use a pop-up blocker
The university's network is setup to allow students to play popular video games on the internet via common ports. However, we won't make changes to accomodate special setups for gaming consoles or computers. Here is a link to instuctions on how to setup your gaming console on the university network.