Cyber Security For Students – Before We Get Into The Topic, let’s Learn Some Basic Of This Topic

According to U.S. Census Bureau data from 2016, 89 percent of American homes had a computer and/or smartphone, and 81 percent had a broadband internet subscription. For communication, entertainment, healthcare access, financial services, and, increasingly, higher education, we rely on the internet.

Nearly 7 million college students enrolled in at least one distance education course in the autumn of 2018, with 3.2 million taking programs entirely online. As schools turn to remote learning options to keep students, employees, and faculty safe during the COVID-19 outbreak, these numbers are sure to rise.

The internet, on the other hand, does far more than allow us to Zoom into virtual classroom meetings. Every day, college students use the internet for work and pleasure, conducting research for essays and assignments, keeping in touch via social media, making online purchases, and seeking out the latest in entertainment.

Because of the vast quantity of information and data we share online, we are all vulnerable to cyber threats. Young people and college students are statistically more prone to fall for fraud scams than older folks and utilize social media at higher rates than other age groups, thus the risk is generally greater.

Why Cybersecurity Awareness is Important?

CSO Online, a prominent source of information for chief security officers and senior executives, recently looked at industry surveys and research studies to gain a sense of the current cybersecurity landscape. Some of what they discovered astounded them:

It’s a risky world out there. To gain access to our most sensitive data and personal information, modern thieves and hackers employ more complex methods.

You don’t even have to click on an infected link these days to get hidden malware that can record your keystrokes, check your system for personal files, and hijack your online banking activities. Phishers typically employ spoof websites, email addresses, and social media identities to get access to personal information and manipulate user confidence. Data breaches, money loss, and identity theft can all occur when using popular services like free Wi-Fi, ATMs, and public computers.

We are putting ourselves at greater risk as we progressively digitize our lives. It’s never too late to brush up on online safety practices and boost your cybersecurity awareness, whether you’re preparing to start your first or final year of college.

The most effective strategy to combat cybercrime is to prevent it. To arm yourself both on and off-campus, use the statistics, stories, and recommendations below.

Computer and Mobile Security Vulnerabilities

The rising use of social media, cloud storage, digital downloads, and mobile and online payments are fueling an upsurge in cybercrime around the world. Personal and financial information about consumers is all over the place, and hackers are growing better at extracting it. Malware, ransomware, and phishing attempts that target social security numbers, credit card information, and bank account data are particularly common on computers and mobile devices.

According to recent data, the education sector ranks bottom in terms of cybersecurity performance when compared to all other major industries. As a result, it is more crucial than ever for college students to take charge of their personal internet safety.

When You Don’t Vaccinate Your Computer And Mobile Phone?

Hacking is no longer a question of “if,” but “when.” In 2019, 89 universities, colleges, and school districts across the United States were targeted by ransomware. You must take extra precautions to protect your own devices, no matter how secure your university networks appear to be.

Experts advocate applying any software updates, arming yourself with cybersecurity tools like antivirus software, and routinely backing up your data to keep your equipment safe from hackers. Keep in mind that hackers are not prejudiced. Never take it for granted that you will not be targeted.

To help protect your technology against cybercrime, follow these steps:

Software upgrades for computers and smartphones assist to fix security holes and secure data. When your Mac prompts you to download and install updates, it’s time to quit clicking “Remind Me Tomorrow.”

Only download software from manufacturers’ websites and other reputable sources. Hackers employ plausible fakes (urgent update alerts, download pages, and so on) to transmit malware and ransomware to unwary consumers all over the internet.

Whether you have a Mac or a PC, you should invest in reliable virus and spyware protection. At least once a week, scan your computer.

In case you need to restore data and files after a cyberattack, back up your computer regularly to an external hard drive and/or a cloud-based storage system.

Enable pop-up blocking and use private browsing when viewing the web. Cookies can allow hackers to exploit security flaws, therefore it’s better to delete them regularly.

Maintain a close eye on your credit score, credit cards, and bank accounts. Set up text alerts to notify you of any fraudulent activities.

When You Visit Unsecure Or Torrent Websites?

While browsing, you may have noticed that certain website URLs begin with “HTTP,” while others begin with “HTTPS.” The difference is significant. HTTPS websites encrypt user data and communications. Hackers can access transferred information, including login credentials, in plain text format on unsecured HTTP sites.

Massive digital repositories of information, including movies, music, video games, and software, are hosted by torrent websites like The Pirate Bay. This content is available for free to anyone, however torrenting is not without risk. Malware infection, internet service provider penalties, and legal settlements from copyright holders are all risks.

Phishing attacks today involve sophisticated login page clones. Make that the web address for your school email, Canvas account, or online banking is correct before using it. Never use an HTTP website to send sensitive information like usernames, passwords, or credit card numbers.

Keep in mind that your internet activity may endanger other students. Cyberattacks that start on your computer have the potential to spread to other devices and possibly the entire university system.

According to a 2015 study, malware-infected around 12 million monthly users after downloading torrent files. Refrain from downloading the latest Hollywood movie or the digital version of your costly calculus textbook. It’s not worth it to risk your personal and financial information.

When You Discard Or Sell Old Devices Without Wiping Them Clean?

In 2017, an Ontario kid exchanged her old, broken iPhone 5s for $11. She received messages from a stranger who had purchased her old phone and now had access to all of her contacts, social media accounts, texts, and images some months later.

Natalie’s data was eventually deleted by the stranger, who buys reconditioned phones in bulk for resale and apologized for upsetting her. In the hands of a bad user, though, the repercussions may have been far worse.

You must take steps to ensure that your data is permanently deleted, overwritten, and inaccessible whether you want to throw away, resell, recycle, or trade-in your old computer or phone.

Take care not to take or save personal images on your gadgets. Someone could still acquire access to your files, no matter how safe you think they are.

Consider downloading antitheft tools or software to help wipe your data before discarding your old computer. The built-in Disk Utility tool on a Mac may wipe and overwrite a hard drive.

Remove or wipe the SIM and micro SD cards from your old phone.

Consider recycling your old equipment directly with the manufacturer instead of reselling them on eBay. You could even be able to get a discount on a new replacement.

Password Security Weaknesses

For a variety of reasons, including the fact that their success is dependent on the human user, passwords provide rather insufficient protection for personal information and data. We’re all guilty of repeating passwords, sharing them with others, or writing them down in easily accessible places.

To crack passwords, hackers utilize a variety of methods, including brute force attacks, phishing, and keylogger software. You may not be able to defend yourself from all threats, but bad password habits can make it all too simple for outsiders to obtain access to your devices, social media accounts, and bank accounts.

If Your Password Is Too Simple
You’re not alone if you use passwords that are easy to guess. Millions of individuals still use well-known easy passwords like “123456,” “password,” and “asdf” to secure their accounts. In 2016, Mark Zuckerberg’s Twitter account was hacked while it was secured using the password “dadada.”

Passwords are the first line of defense when it comes to protecting your devices and data. Instead of using numbers, special characters, and capital letters in your password, experts now propose using long sequences of text, such as nonsense words, that are easy to remember.

When Your Password Is Too Easy?

Birthdays, pet and family names, locations, and single words should all be avoided. Hackers can get this information through dictionaries and social media.

According to research, changing passwords regularly is typically ineffective because individuals make modest modifications that are easy to guess. Instead, concentrate on creating a strong, long-lasting password, and only update it if your account has been compromised.

When two-factor authentication is available, use it. Even if a hacker properly guesses your password, this can safeguard your account from a compromise.

Keep a close eye on your passwords. This means no sticky notes on your desk, no lists emailed to you, and no documents in cloud storage that aren’t password-protected. Instead, use password management tools, password-protected documents, or handwritten suggestions stored safely away from your device.

When You Use The Same Password For Numerous Sites?

Passwords are used for everything. A majority of us have more than ten password-protected accounts, according to a Digital Guardian survey of 1,000 internet users. Nearly a third of those polled stated they had “too many to count.”

It’s difficult to keep track of all those passwords. We’ve all experienced the agony of getting locked out of our own accounts after guessing too many incorrect passwords. This makes using the same password on various websites quite appealing, but password reuse can be a big security issue.

Do not reuse passwords across several accounts. Instead, develop several password tiers based on the importance of the data/information. You might contemplate reusing passwords for Netflix, Instagram, or Spotify, but make sure your bank, credit card, and school accounts all have unique passwords.

Follow the guidelines in the last section to make your passwords difficult to crack, whether you reuse them or not.

When You Store Sensitive Data In Contacts On Your Phone?

Our Contacts apps have fields for entering phone numbers, home addresses, email addresses, birthdays, and other information. It appears to be the ideal location for storing information about friends, family, and coworkers, but the convenience comes at a cost. In most cases, the information in our phone and computer address books is saved as plain text, with no security precautions.

This means that storing your mother’s credit card data or a friend’s home security code in the “Notes” area of their contacts page is a bad idea. You shouldn’t try to hide any of your personal information in Contacts. Rather than hiding your Social Security Number as a phone number under the name “Steven St. Nicholas,” work on memorizing it.

Bank PINs, account numbers, health information, and passwords are among the other items to avoid saving in address books.

Instead, keep information in a password-protected file or a handwritten note in a safe location.

Many password managers also provide a protected “Notes” section.

Phishing Attacks

Phishing is a hacking technique that involves sending fake emails, websites, and other types of electronic communication to collect sensitive information such as usernames, passwords, and credit card numbers. According to Verizon’s annual Data Breach Investigations Report, phishing was the main cause of data breaches in 2019 and 2020.

For the first time in college, many young people begin really managing their own finances, taking on the obligations of credit cards, loans, and bank accounts. College students are a great target for phishing attempts since they have a lot of sensitive data and are inexperienced. The best way to stay safe online is to be aware of the risks.

When You Follow A False Link Or Reply To A Fake Email?

Hackers have long used phishing emails to obtain personal and private information. Thousands of Dartmouth University students were targeted by a phishing email posing as the university’s president in 2017. The recipients were asked to enter their university NetID via an embedded link.

Similar COVID-19 phishing scams have been targeting college students this year. These messages purport to be from university financial departments and direct students to portals where they must enter their login credentials.

Phishing emails often look to come from well-known senders and ask you to confirm your banking information, login passwords, or credit card information. These emails may have the same style, color scheme, and language as the real thing, and may link to a site created particularly to spoof it.

Follow these tips to identify and avoid phishers:

  • It’s a good rule of thumb to be suspicious of every email that arrives in your inbox. Check the sender’s email address for phishing giveaways such as an incorrect domain.
  • For receivers to disregard the warning indicators and respond without thinking, phishing emails typically create a false sense of urgency. Be wary of emotional messages about account suspension, debt, or limited-time deals.
  • Most valid emails nowadays address recipients by name. Avoid greetings that are impersonal or general, such as “Dear user” or “Dear valued customer.”
  • If the email has a link, take a close look at the URL. Look for the “HTTPS” in the URL. Rather than opening the embedded email link, which could give hackers access to your personal information right away, type the address into your browser and see where it takes you.

When You Open An Infected Attachment?

Fake fraternity recruitment emails and senders posing as professors looking for student jobs are two common phishing scams spotted on the Bowling Green State University campus. Students may receive numerous such emails every week, many of which contain dubious attachments that they should avoid opening.

According to one expert analysis, typical attachment types such as.DOC,.XLS,.PDF, and.ZIP are found in 85 percent of all malicious emails. These attachments may appear to be completely safe in certain situations, but many of them contain malware and other malicious characteristics that may be activated with a single click. Phishers can use these technologies to steal important information, demand a ransom for the safe return of your data, or even take control of your device remotely.

  • Email attachments should be handled with caution. Never open one unless you know who sent it and if you’re expecting the attachment. Remember that if an email address has been compromised, it can send infected attachments.
  • Whenever possible, avoid downloading and installing software that has been delivered to you over email. Instead, look for a download on the manufacturer’s website.
  • Verify any unexpected circumstances. Before you open an attachment, double-check with the sender.
  • If you suspect an email is phishing, do a quick Google search to see if similar phishing scams have been reported.

When did You answer A Suspicious Phone Call?

Texting and social media are popular among college students, yet there are times when we need to make a traditional phone call. Phishers seeking financial information frequently utilize phone scams since they have been proved to work. In 2019, over one-sixth of all Americans lost money as a result of a phone hoax.

To combat phishing calls, major mobile carriers such as T-Mobile, AT&T, and Sprint have developed scam prevention capabilities in recent years. When your caller ID flags an incoming number as “scam likely” or “possible fraud,” you can witness this in action. This feature works by comparing callers’ phone numbers to a database of reported scam numbers.

  • Unfortunately, phishing calls continue to get through. Financial aid, tuition, and taxes are the most typical phone hoaxes aimed at college students. Use the following advice to be safe:
  • Unusual callers should be avoided, especially those that utilize an “unknown number” ID. Allow your voicemail to handle the situation. Keep in mind that caller IDs can be spoofed as well.
  • Never give out your personal or financial information to a caller. Wire transfers or prompt payments over the phone are not required by legitimate university administrations. The IRS, for example, never makes cold calls to residents.
  • Hang up and phone the school directly to confirm and follow up if a suspicious caller claims to be from your university

When You Follow A Malware Link In A Text?

Every day, millions of phishing attempts are attempted via text messaging, according to Pierson Clair, managing director of cyber risk at risk management firm Kroll. Many phishing scams rely on duping the recipient into divulging important information, but more harmful phishing letters may include links to software that monitors your behavior, data, and files without your knowledge.

  • Hackers have recently targeted both Apple and Android devices. Manufacturers quickly build software patches to fix vulnerabilities and remove security flaws once they are found, but these patches may be too little, too late for affected users. To keep your device safe, follow these steps:
  • Clicking on links in text messages should be avoided. Shortened URLs, such as bit.ly addresses, should be avoided since they may be exploited to conceal the true destination of a link.
  • To resolve any security flaws, keep your phone’s software up to date.
  • Report the problem to the manufacturer if you feel your device has been compromised with malware.

Social Media Dangers

According to Experian Simmons’ study from 2011, 98 percent of college-aged students utilize social media. Teens and young adults prefer YouTube, Instagram, Facebook, and Snapchat, with Twitter, Pinterest, and Reddit following closely behind. Although social media can provide a convenient and direct means of connecting with others, it also comes with some risks.

Anonymous trolls, mean-spirited acquaintances, and overbearing friends, family members, or partners can bully and harass people on social media networks. A single blunder on social media can result in hacking, the release of private images, or financial fraud.

When You’re Harassed, Bullied, Or Stalked On Social Media?

According to the Cyberbullying Research Center’s data from 2019, almost 37% of students aged 12 to 17 reported experiencing cyberbullying at some point in their lives.

Although the majority of cyberbullying research focuses on students in grades K-12, online harassment may affect anyone of any age. According to a survey of 439 college students, 38 percent knew someone who had been cyberbullied, 21.9 percent had been the victim of cyberbullying, and 8.6 percent had been the perpetrator of cyberbullying.

Cyberbullying is a serious threat to victims’ mental and emotional well-being. Online harassment and stalking can sometimes spill over into real life, putting one’s physical safety and security in jeopardy. Consider the following suggestions to make yourself less sensitive to this form of toxic behavior:

  • Avoid sharing personal information such as your phone number, home address, location, or school name on public-facing social media.
  • Be cautious about sharing images that could reveal your whereabouts to strangers. On all social media channels, turn off geotagging.
  • Check your social media accounts’ security settings regularly.
  • Accepting friend requests from students and other strangers is not a good idea.
  • If you’re going to be gone from home, don’t tell anyone. Burglars could use this knowledge to target your vacant home.
  • If you are the victim of cyberbullying or harassment, take the following steps:
  • Make it clear that you would like to be left alone.
  • Use social media features to isolate the offender. This could include blocking the user, limiting who can see your posts, or changing your account’s privacy settings.
  • Take screenshots, record phone calls, and save emails, texts, and voice messages to document the problem.
  • Notify the social media provider and/or campus police about the problem.
  • Consider contacting the counseling center at your school or a crisis hotline.

When You’re The Subject Of Revenge Porn?

In its broadest sense, revenge porn is the unintentional distribution of private, intimate, or sexually explicit images and videos. This type of nonconsensual pornography is typically shared by the victim’s ex-partner as a way of “getting back” at the victim for alleged wrongdoing following a fight or breakup. Hackers may also be able to obtain and share personal photos.

  • According to a 2016 research by the Data & Society Research Institute, one out of every 25 Americans has been a victim of revenge porn, and one out of every ten women under 30 has been threatened with intimate image disclosure.
  • Currently, 41 states have legislation prohibiting the sharing of revenge pornography. Penalties can range from misdemeanors to felonies, with probation, fines, and/or imprisonment as possible outcomes.
  • Even with a trusted partner, the only way to completely protect yourself against nonconsensual pornography is to avoid shooting or sharing intimate images.
  • If you must take intimate images, save them on your computer in an encrypted, password-protected folder rather than in cloud storage. Keep in mind that apps like Snapchat can be remotely hacked and monitored.
  • Document and report nonconsensual pornography to the social media provider and campus police if you become a victim. Consider contacting the counseling facility at your school or a crisis hotline.

When You’re Hacked Through A Social Media Post?

Facebook is the most popular social networking site on the planet, drawing teenagers, adults, senior citizens, and fraudsters looking for easy targets. Phishers and hackers frequently transmit and disseminate dangerous URLs disguised as unexpected films, prizes, and accolades, or adverts using faked accounts, hijacked accounts, and false pages.

These URLs may direct you to spoofed Facebook sign-in pages that ask you to verify your credentials, websites that request personal information, or websites that contain a “drive-by download,” which infects your device and steals data without your awareness.

  • Hackers can simply figure out your unique interests and modify messages, posts, and scams to fit your needs. They may take over accounts or develop impersonations to make you believe you’re speaking with a close friend or sibling. Always be on the lookout and wary.
  • We all want to know which Disney character our profile photo most closely resembles, but it’s better to stay away from Facebook polls and quizzes that require you to grant third-party websites access to your account information. It’s impossible to predict where it will end up.
  • When it comes to social media, the adage holds: “If it looks too good to be true, it generally is.” No one is going to offer you a free automobile just because you like and share a message.

When You’re Scammed By A Social Media Connection?

After falling for financial fraud, University of Washington students lost a total of $1 million in tuition fees in 2016. The con, which was shared on social media by a trusted UW student, claimed to save people 5% on their summer tuition if they paid through a middleman.

Every year, we spend a lot of money on tuition, fees, lodging, books, and supplies. Scammers are eager to join in on the activity, defrauding students with methods such as forged cheques, too-good-to-be-true apartment ads, and scholarship frauds. Scammers may pose as other students, alumni, professors, or other individuals associated with the school or trusted organizations in an attempt to earn students’ trust.

  • Things that look too good to be true, at least when it comes to social media, usually are. Examine any offers of financial aid with care.
  • Scholarships that are legitimate rarely charge application or processing fees. It’s most certainly a fraud if you have to spend money before receiving anything in return.
  • Keep an eye out for faked accounts or phony online personas. Always verify the identity of the person you’re connected to before taking any financial aid or submitting any personal information.

Campus Thefts and Scams

The future of living and learning on college campuses is mostly uncertain due to the novel coronavirus epidemic. Some schools intend to continue offering virtual classes until 2021, while others have chosen to experiment with in-person attendance options, with various degrees of success.

When Your Laptop Or Cellphone Isn’t Secure?

According to the National Center for Education Statistics, burglary was the most common crime on college campuses in the United States every year from 2001 to 2016.

While you’re taking a restroom break at the library or visiting the public kitchen in your dorm building, a bold burglar can swipe your smartphone or laptop in seconds. You might lose access to time-sensitive assignments, be forced to pay hundreds of dollars for a replacement and be forced to report a crime to campus police if you lose your gadget. College is difficult enough without those annoyances.

To keep your technology safe, follow these guidelines:

Even if you’re only going to be gone for a few minutes, always lock your dorm room before you leave.

Consider purchasing a laptop cord lock. It can be used in public places to keep your laptop safe.

Even if it’s hidden, never leave your laptop in the car. The school security office will require you to register your laptop and phone. Your name, student ID, and contact details are linked to the brand, model, and serial number. You may also receive a registration sticker to attach to your device as a deterrence to would-be thieves.

Enable built-in tracking features on your devices, such as Apple’s “Find My” app, or download a similar program like Prey or Absolute.

Back up your devices and contents to a cloud storage system and/or an external hard drive regularly. This ensures that you always have access to what you need and allows you to remotely wipe your devices if they are lost or stolen.

On-Campus, If You Pick Up An Infected Device

Researchers from Google, the University of Michigan, and the University of Illinois at Urbana-Champaign collaborated in 2016 to perform a study on college students’ habits when they locate “lost” USB devices. The researchers dispersed 300 hard drives over the UIUC campus and counted how many were found. At least 45 percent of the drives were eventually attached to computers, with one disc being plugged in only six minutes after it was dropped.

Because USB drives may contain malicious software, this is a problem. Stuxnet, widely regarded as the world’s first digital weapon, was transmitted via USB drives in 2010. In 2016, researchers identified a novel USB-based malware that could install itself and steal user data without being detected.

Any gadget you find on campus, whether it’s a USB drive, a laptop, or a cell phone, should be treated with caution.

To identify the owner, do not plug any unknown gadgets into your computer. Take them to the lost and found or IT department at your school.

Avoid sharing USB drives with others and be cautious when inserting them into public computers to reduce the chance of infection. Scanning any device provided to you, even by a trusted acquaintance, with security software is a good idea.

When Using A Shared Workstation?

In the United States, 10% of college students — over 2 million people — do not have access to their personal laptops for school use. To accomplish coursework, these students must rely on computer labs, library desktops, and other shared workstations. Even students who have their own devices rely on school computers to stay connected, conduct research, or complete homework in a quiet space.

While schools provide well-protected networks to shield kids from some risks, communal workstations are not without risk. You could be exposed to dangerous software, infected files, malware, or keyloggers as a result of them.

When using public computers, avoid signing into websites as much as possible. If you do need to log in, remember to log out before leaving.

Never complete a financial transaction, download software, or browse shady websites on a public computer.

Before logging off, use private browsing options or erase your browsing data.

Keep an eye on what’s going on around you. Shoulder surfers may attempt to obtain sensitive information such as usernames, passwords, and credit card numbers.

Threats to Data Security from Travel and Off-Campus

While college campuses have well-protected Wi-Fi networks to keep your data safe, take extra precautions when traveling off-campus for vacation, academic field trips, or a weekend study session at the local Starbucks. Hackers and other cybercriminals love to target public places because they often have insufficient cybersecurity safeguards, a large number of unknowing victims, and a high level of anonymity.

Although most of us are traveling less as a result of COVID-19, it’s never a bad idea to brush up on our cybersecurity knowledge.

If and when you return to college, you’ll need to think about more than simply basic internet safety. In crowded college campuses, a new set of risks emerge, including the physical security of your devices, new opportunities for hackers to propagate malware, and risks linked with shared computers.

According to the Cyberbullying Research Center’s data from 2019, almost 37% of students aged 12 to 17 reported experiencing cyberbullying at some point in their lives.

Although the majority of cyberbullying research focuses on students in grades K-12, online harassment may affect anyone of any age. According to a survey of 439 college students, 38 percent knew someone who had been cyberbullied, 21.9 percent had been the victim of cyberbullying, and 8.6 percent had been the perpetrator of cyberbullying.

Cyberbullying is a serious threat to victims’ mental and emotional well-being. Online harassment and stalking can sometimes spill over into real life, putting one’s physical safety and security in jeopardy. Consider the following suggestions to make yourself less sensitive to this form of toxic behavior:

Avoid sharing personal information such as your phone number, home address, location, or school name on public-facing social media.

Be cautious about sharing images that could reveal your whereabouts to strangers. On all social media channels, turn off geotagging.

  • Check your social media accounts’ security settings regularly.
  • Accepting friend requests from students and other strangers is not a good idea.
  • If you’re going to be gone from home, don’t tell anyone. Burglars could use this knowledge to target your vacant home.
  • If you are the victim of cyberbullying or harassment, take the following steps:

Make it clear that you would like to be left alone.

  • Use social media features to isolate the offender. This could include blocking the user, limiting who can see your posts, or changing your account’s privacy settings.
  • Take screenshots, record phone calls, and save emails, texts, and voice messages to document the problem.
  • Notify the social media provider and/or campus police about the problem.
  • Consider contacting the counseling center at your school or a crisis hotline.

When You’re The Subject Of Revenge Porn?

In its broadest sense, revenge porn is the unintentional distribution of private, intimate, or sexually explicit images and videos. This type of nonconsensual pornography is typically shared by the victim’s ex-partner as a way of “getting back” at the victim for alleged wrongdoing following a fight or breakup. Hackers may also be able to obtain and share personal photos.

According to a 2016 research by the Data & Society Research Institute, one out of every 25 Americans has been a victim of revenge porn, and one out of every ten women under 30 has been threatened with intimate image disclosure.

  • Currently, 41 states have legislation prohibiting the sharing of revenge pornography. Penalties can range from misdemeanors to felonies, with probation, fines, and/or imprisonment as possible outcomes.
  • Even with a trusted partner, the only way to completely protect yourself against nonconsensual pornography is to avoid shooting or sharing intimate images.
  • If you must take intimate images, save them on your computer in an encrypted, password-protected folder rather than in cloud storage. Keep in mind that apps like Snapchat can be remotely hacked and monitored.
  • Document and report nonconsensual pornography to the social media provider and campus police if you become a victim. Consider contacting the counseling facility at your school or a crisis hotline.

When You’re Hacked Through A Social Media Post?

Facebook is the most popular social networking site on the planet, drawing teenagers, adults, senior citizens, and fraudsters looking for easy targets. Phishers and hackers frequently transmit and disseminate dangerous URLs disguised as unexpected films, prizes, and accolades, or adverts using faked accounts, hijacked accounts, and false pages.

These URLs may direct you to spoofed Facebook sign-in pages that ask you to verify your credentials, websites that request personal information, or websites that contain a “drive-by download,” which infects your device and steals data without your awareness.

  • Hackers can simply figure out your unique interests and modify messages, posts, and scams to fit your needs. They may take over accounts or develop impersonations to make you believe you’re speaking with a close friend or sibling. Always be on the lookout and wary.
  • We all want to know which Disney character our profile photo most closely resembles, but it’s better to stay away from Facebook polls and quizzes that require you to grant third-party websites access to your account information. It’s impossible to predict where it will end up.
  • When it comes to social media, the adage holds: “If it looks too good to be true, it generally is.” No one is going to offer you a free automobile just because you like and share a message.

When You’re Scammed By A Social Media Connection?

After falling for financial fraud, University of Washington students lost a total of $1 million in tuition fees in 2016. The con, which was shared on social media by a trusted UW student, claimed to save people 5% on their summer tuition if they paid through a middleman.

Every year, we spend a lot of money on tuition, fees, lodging, books, and supplies. Scammers are eager to join in on the activity, defrauding students with methods such as forged cheques, too-good-to-be-true apartment ads, and scholarship frauds. Scammers may pose as other students, alumni, professors, or other individuals associated with the school or trusted organizations in an attempt to earn students’ trust.

  • Things that look too good to be true, at least when it comes to social media, usually are. Examine any offers of financial aid with care.
  • Scholarships that are legitimate rarely charge application or processing fees. It’s most certainly a fraud if you have to spend money before receiving anything in return.
  • Keep an eye out for faked accounts or phony online personas. Always verify the identity of the person you’re connected to before taking any financial aid or submitting any personal information.

Campus Thefts and Scams

The future of living and learning on college campuses is mostly uncertain due to the novel coronavirus epidemic. Some schools intend to continue offering virtual classes until 2021, while others have chosen to experiment with in-person attendance options, with various degrees of success.

If and when you return to college, you’ll need to think about more than simply basic internet safety. In crowded college campuses, a new set of risks emerge, including the physical security of your devices, new opportunities for hackers to propagate malware, and risks linked with shared computers.

When You Don’t Secure Your Laptop Or Cellphone?

For a variety of personal and professional duties, we rely on the internet. Businesses and other public areas are well aware of this, and they frequently take advantage of it by providing Wi-Fi connections to attract and retain consumers. Almost every fast-food restaurant, wayside hotel, and airport terminal have free Wi-Fi connections.

Nearly half of working adults in the United States believe that public Wi-Fi networks will keep their data safe. Regrettably, handy connections might conceal a plethora of risks. Cybercriminals can simply snoop on public internet connections, intercept communications, and steal user data using free and low-cost software.

  • By blocking your devices’ capacity to automatically connect to adjacent Wi-Fi, you can keep track of when and when you’re connecting.
  • Before connecting to a network, make sure it’s legitimate. In an attempt to deceive unwary customers into getting on, hackers may set up their own Wi-Fi connections near trustworthy businesses.
  • When shopping online, accessing financial information, or visiting sensitive websites, avoid utilizing public Wi-Fi. Protect your social media and email accounts by using two-factor authentication.
  • To encrypt your data, use a free or premium virtual private network (VPN) service.
  • The easiest method to avoid the dangers of public Wi-Fi is to avoid it altogether. Consider getting a data package with unlimited data or purchasing your own portable mobile router.

When Your Money Is Stolen By An ATM Skimmer?

ATM data fraud was reported by 86 percent of surveyed ATM operators in 2019, according to the ATM Industry Association. PIN compromise, transaction reversal fraud, and cash trapping were the most commonly reported types of ATM fraud. Worryingly, 91 percent of respondents stated ATM skimming devices were becoming smaller, making them more difficult to detect.

Criminals utilize electronic gadgets disguised as part of the machine to skim money from ATMs. When users use a hacked ATM, the skimmer records card details, and PINs are recorded by a concealed camera or a fake keypad. ATM skimming is one of the fastest-growing financial crimes, costing individuals and institutions an estimated $8 billion each year.

  • Check an ATM for any unusually added devices before using it.
  • If you’re having problems inserting your card, there could be an inside skimmer at work. Please don’t use the machine.
  • When typing your PIN on an ATM, always cover the keypad with your hand. Keep an eye out for shoulder surfers who are standing too close to you.
  • Keep the phone number for your bank’s customer service readily hand. Call the number to get your accounts frozen if you lose your card or suspect your information has been compromised.

Internet Safety and Security Awareness Resources for Students

Cybersecurity Education

Internet Safety Groups and Resources

CiviliNation is a non-profit organization dedicated to combating internet harassment, assassination, and violence. The group is dedicated to preserving free speech and establishing an online culture in which people can freely participate and contribute without fear of harassment, abuse, or deception. Their website has an enormous library of educational materials as well as a reference center.
Through education and amplification of cybersecurity awareness, the National Cybersecurity Alliance aspires to create a more secure, interconnected society. The website of the National Cyber Security Alliance (NCSA) has tools for online safety, identity theft, account and device security, and privacy management. More than a dozen free security inspections and tools are also available on the site.

Stop. Think. Connect. is a global online safety awareness campaign spearheaded by the National Cyber Security Alliance, the Anti-Phishing Working Group, and the United States Department of Homeland Security. The campaign’s website provides basic safety tips. Users can also obtain specific cybersecurity advice sheets, such as ones on LGBTQ online safety, wedding preparation, and holiday shopping online.

Advocacy and Support Groups for Online Victims

The Cyber Civil Rights Initiative is a non-profit organization that promotes technological, social, and legal innovation to combat online harassment. CCRI focuses on nonconsensual pornography and provides victim aid, including a 24/7 crisis hotline and links to reporting, removal, and legal options.

Without My Consent is an initiative led by the CCRI that attempts to educate people about their online privacy rights and help them assert them. Evidence preservation, copyright registration, takedown notices, and emotional support are just a few of the issues covered by the site’s wide resources.

On platforms like Twitter, Facebook, Instagram, and YouTube, FightCyberstalking.org provides online resources for victims of cyberstalking. Users can get help reporting cyber stalking crimes, getting emotional assistance, and improving their online privacy and security.

Reporting a Cybersecurity Issue or Crime to the Government

For hacked accounts and other infractions of community norms, Facebook, Instagram, Snapchat, Twitter, and YouTube each have their own resources and reporting systems (abusive behavior, inappropriate content, account impersonation, spam, etc.).

Gmail Help has a plethora of articles about account security and safety. You can also use these tools to report phishing emails and other Gmail policy violations.

Reporting a Cybersecurity Issue or Crime to the Government

Internet crime victims can register a complaint with the FBI’s Internet Crime Complaint Center (IC3). The IC3 is not responsible for conducting its own investigations. Rather, it examines the material given and, where necessary, passes it to the appropriate federal, state, municipal, or international entities. The site also includes information on how to avoid being a victim of online crime.

IdentityTheft.gov is the federal government’s one-stop-shop for people who have been victims of identity theft. The site has a wealth of resources and tools to assist you in preventing, recognizing, reporting, and recovering from identity theft.

The IRS will never approach you via email, text, phone, or social media to ask for personal or financial information such as PINs or passwords. Report the event to the Treasury Inspector General for Tax Administration and phishing@irs.gov if you receive unsolicited or suspicious contact from someone purporting to be from the IRS. On the IRS website, you may learn more about phishing.

Campus Resources

Your school’s office of information technology services can assist you in recovering data from a hacked device, providing free security software such as VPNs and antivirus programs, as well as providing cybersecurity awareness and internet safety advice and tutorials. Although online students may not be able to visit the technology services office in person, practically every institution provides some form of remote technical assistance. Always report problems to this office, such as phishing emails addressed to your school email.

Students, workers, and school buildings are all protected by university police and safety departments. If you are a victim of cyberbullying, online harassment, or stalking, you must report it to the school police. Make sure you include evidence in the form of screenshots, emails, or text messages. Officers from the campus safety department will respond to your allegations and give you advice on how to protect your digital and physical safety.

It’s critical to get emotional support if you’re experiencing online harassment or cyberbullying. Student counseling programs include a range of basic services from mental health experts who are trained and licensed. On-campus students have the option of receiving one-on-one or group therapy. For students who are unable to attend campus, several colleges provide online and phone counseling.

Your school’s online student services department, which is specifically geared to help remote learners, can direct you to the resources you need while attending college away from campus. If you’re not sure where to turn for assistance, these helpful employees are a wonderful place to start.

Categorized in: