Skip to Main Content

UMBC Cybersecurity and IT Compliance

  • Hacker Posing as Graduate Program Director - Phishing Scam

    Today the Security team at DoIT received reports of a phishing scam targeted at the Physics Department.  We have decided to make this a campus-wide announcement, as hackers could potentially send...
    Posted: July 15, 2019 10:56 AM
  • "Department Admin" Phishing Scam

    This past week, UMBC users have reported an increase in the occurrence of a particular phishing attack from a specific domain. This phishing email content is as follows: “From: UMBC...
    Posted: June 14, 2019 11:45 AM
  • "Part-Time Job Opportunity" Phishing Scam

    Recently, UMBC users have reported the increased receipt of a specific phishing attack stemming from a particular domain. The phishing email content is as follows: “From: Guthrie, Melinna...
    Posted: May 24, 2019 1:00 PM
  • Recent Phishing Attempts At UMBC

    Whether you are a student, teacher, or any other faculty member, we all have different goals and aspirations in our everyday lives at UMBC. What we all have in common in this community is making...
    Posted: April 3, 2019 10:58 AM
  • Backing Up Data

    What is Backup? Backup is for recovery from hardware failure or recent data corruption or loss. Why Backup is needed? A Backup is copy of your data that is made in order to protect...
    Posted: December 18, 2018 11:33 AM
  • Hotspots and Public Wi-Fi

    Public Wi Fi is famous with its easily availability and free access. Any person with their computer or other devices can access Public Wi -Fi. Public Wi -Fi could be found in convenient places...
    Posted: December 10, 2018 10:48 AM
  • Social Engineering

     Definition of Social Engineering. In social engineering, a cybercriminal is basically relying on social activities (and interactions) of human beings to collect information by tricking them....
    Posted: November 6, 2018 9:33 AM
  • RISKS OF DIGITAL DEVICES LEFT UNATTENDED.

    The topic is about pros and cons for leaving a digital device unattended, such as a cell phone, a laptop or a desktop computer. It does not matter whether devices are personally owned or business...
    Posted: October 31, 2018 1:31 PM
  • Camera Breach!

    Introduction - pros and cons of security cameras. We are living in an age of an Internet-Of-Things (IOT). We know that cyber risk exists whenever a device is connected to an Internet. And,...
    Posted: October 23, 2018 10:39 AM
  • Hack Yourself!

    Security! What is it needed for?
    Today we are relying on our devices more and more. Cyber risks associated with smartphones are increasing day by day.   Here is the summary of cyber risks related to smartphones: Covering...
    Posted: October 10, 2018 1:59 PM