Everyone at Michigan Tech has used two-factor authentication (2FA) for their Michigan Tech accounts. You may know it better by its name—Duo. But did you know that the benefits of using 2FA reach far beyond your accounts at Michigan Tech? If a website offers two-factor, we recommend you enable it. Read more below about how . . .
Don’t let Thanos wipe out your data or steal your identity. Arm yourself for the Endgame with the knowledge hidden in these Infinity Stones.
Cybercriminals use types of social engineering—manipulating people into doing what they want—as the most common way to steal information and money. Social engineering is at the heart of all types of phishing attacks—those conducted via email, SMS, and phone calls. Technology makes these sorts of attacks easy and very low risk for the attacker. Make sure you’re on the lookout for these variants on the traditional, mass emailed phishing attack: