How to Locate the Report Phish Button

IT Services has implemented an easier way to report suspicious emails from your University Outlook or Gmail inbox. This feature, called Report Phish, allows you to report phishing or other suspicious emails with the click of a button. The Report Phish button will...

Learn How to Refuse the Phishing Bait

Phishing – when a cybercriminal poses as a legitimate party in hopes of getting someone to engage with malicious content or links – remains one of the most popular tactics among cybercriminals today. In fact, 80% of cybersecurity incidents and 90% of data breaches...

Cybersecurity Career Awareness Week

Cybersecurity is a dynamic and rapidly growing field, with new threats and challenges emerging each day. And with that, there is a huge push being undertaken by both business and education sectors to attract individuals toward a degree and career in cyber. Whether...

Protecting Yourself Against Ransomware Attacks

In week 1 of Cybersecurity Awareness Month, we focused on educating you on the different types of phishing attacks we have seen and that many have reported receiving in the UChicago community. The most important element in a successful phishing attack is the human...

5 Ways to Outsmart a Social Engineer

“Social engineering” is a newer term for an age-old pursuit: tricking people. Whether you use the modern-day terminology or opt for longer-standing classifications (like conning, hustling, and swindling), the result is the same. Scammers aren’t afraid to tell lies—...