Skip to Main Content

UMBC Cybersecurity and IT Compliance

  • Hacker Posing as Graduate Program Director - Phishing Scam

    Today the Security team at DoIT received reports of a phishing scam targeted at the Physics Department.  We have decided to make this a campus-wide announcement, as hackers could potentially send...
    Posted: July 15, 2019 10:56 AM
  • Universities Find Themselves Most Vulnerable To Cybercrime

    What is Cybersecurity? Palo Alto Networks defines cybersecurity to be a system of actions taken to protect sensitive and important information from cyber threats. This information can be...
    Posted: July 10, 2019 11:42 AM
  • "Department Admin" Phishing Scam

    This past week, UMBC users have reported an increase in the occurrence of a particular phishing attack from a specific domain. This phishing email content is as follows: “From: UMBC...
    Posted: June 14, 2019 11:45 AM
  • "Part-Time Job Opportunity" Phishing Scam

    Recently, UMBC users have reported the increased receipt of a specific phishing attack stemming from a particular domain. The phishing email content is as follows: “From: Guthrie, Melinna...
    Posted: May 24, 2019 1:00 PM
  • Recent Phishing Attempts At UMBC

    Whether you are a student, teacher, or any other faculty member, we all have different goals and aspirations in our everyday lives at UMBC. What we all have in common in this community is making...
    Posted: April 3, 2019 10:58 AM
  • Backing Up Data

    What is Backup? Backup is for recovery from hardware failure or recent data corruption or loss. Why Backup is needed? A Backup is copy of your data that is made in order to protect...
    Posted: December 18, 2018 11:33 AM
  • Hotspots and Public Wi-Fi

    Public Wi Fi is famous with its easily availability and free access. Any person with their computer or other devices can access Public Wi -Fi. Public Wi -Fi could be found in convenient places...
    Posted: December 10, 2018 10:48 AM
  • Social Engineering

     Definition of Social Engineering. In social engineering, a cybercriminal is basically relying on social activities (and interactions) of human beings to collect information by tricking them....
    Posted: November 6, 2018 9:33 AM
  • RISKS OF DIGITAL DEVICES LEFT UNATTENDED.

    The topic is about pros and cons for leaving a digital device unattended, such as a cell phone, a laptop or a desktop computer. It does not matter whether devices are personally owned or business...
    Posted: October 31, 2018 1:31 PM
  • Camera Breach!

    Introduction - pros and cons of security cameras. We are living in an age of an Internet-Of-Things (IOT). We know that cyber risk exists whenever a device is connected to an Internet. And,...
    Posted: October 23, 2018 10:39 AM