{"id":3811,"date":"2017-08-14T08:15:43","date_gmt":"2017-08-14T12:15:43","guid":{"rendered":"https:\/\/umaine.edu\/it\/?p=3811"},"modified":"2017-08-14T08:15:43","modified_gmt":"2017-08-14T12:15:43","slug":"information-security-reminders","status":"publish","type":"post","link":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/","title":{"rendered":"Information Security Reminders"},"content":{"rendered":"<p>In your daily work lives, the most common security concern\u00a0that you will encounter is phishing. Phishing emails attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The most common method is a\u00a0malicious file attachment, like a\u00a0 Word or PDF document, or a link that\u00a0brings you to a fake login page that harvests your password when you\u00a0unwittingly attempt to login.<\/p>\n<p>In spite of the University&#8217;s email provider&#8217;s (Gmail) very good phishing\u00a0email detection, some of the emails will get through to you. We ask that you be vigilant about carefully checking links and file attachments, and about protecting your passwords.<\/p>\n<p>The UMS Information Security team has a special email address for\u00a0reporting suspicious emails. Please forward them to\u00a0<a href=\"mailto:phish@maine.edu\" target=\"_blank\" rel=\"noopener noreferrer\">phish@maine.edu<\/a>.<\/p>\n<p>For phishing, or any other information security concern, you can always reach us at\u00a0<a href=\"mailto:infosecurity@maine.edu\" target=\"_blank\" rel=\"noopener noreferrer\">infosecurity@maine.edu<\/a>\u00a0or 581-9105 or in our MyUMS\u00a0Portal for Information Security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In your daily work lives, the most common security concern\u00a0that you will encounter is phishing. Phishing emails attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. The most common method is a\u00a0malicious file attachment, [&hellip;]<\/p>\n","protected":false},"author":15,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":"","spc_primary_category":0},"categories":[35,11,1],"tags":[],"class_list":["post-3811","post","type-post","status-publish","format-standard","hentry","category-issue-4","category-it-news","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Information Security Reminders - Information Technology<\/title>\n<meta name=\"description\" content=\"Phishing emails attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Read here about how to protect your accounts and data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security Reminders - Information Technology\" \/>\n<meta property=\"og:description\" content=\"Phishing emails attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Read here about how to protect your accounts and data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-14T12:15:43+00:00\" \/>\n<meta name=\"author\" content=\"mike.kirby\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mike.kirby\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/\"},\"author\":{\"name\":\"mike.kirby\",\"@id\":\"https:\/\/machias.edu\/it\/#\/schema\/person\/30926f14f19f1bcb98075f4906667ca8\"},\"headline\":\"Information Security Reminders\",\"datePublished\":\"2017-08-14T12:15:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/\"},\"wordCount\":177,\"articleSection\":[\"Issue 4\",\"IT News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/\",\"url\":\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/\",\"name\":\"Information Security Reminders - Information Technology\",\"isPartOf\":{\"@id\":\"https:\/\/machias.edu\/it\/#website\"},\"datePublished\":\"2017-08-14T12:15:43+00:00\",\"author\":{\"@id\":\"https:\/\/machias.edu\/it\/#\/schema\/person\/30926f14f19f1bcb98075f4906667ca8\"},\"description\":\"Phishing emails attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Read here about how to protect your accounts and data.\",\"breadcrumb\":{\"@id\":\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/machias.edu\/it\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Reminders\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/machias.edu\/it\/#website\",\"url\":\"https:\/\/machias.edu\/it\/\",\"name\":\"Information Technology\",\"description\":\"University of Maine\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/machias.edu\/it\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/machias.edu\/it\/#\/schema\/person\/30926f14f19f1bcb98075f4906667ca8\",\"name\":\"mike.kirby\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/e02f20ae98dfefbf6c55e78e21cfb59e2d68f1f863ba9c8d6f3ce5b3ed1237cf?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e02f20ae98dfefbf6c55e78e21cfb59e2d68f1f863ba9c8d6f3ce5b3ed1237cf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e02f20ae98dfefbf6c55e78e21cfb59e2d68f1f863ba9c8d6f3ce5b3ed1237cf?s=96&d=mm&r=g\",\"caption\":\"mike.kirby\"},\"url\":\"https:\/\/machias.edu\/it\/author\/mike-kirby\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Information Security Reminders - Information Technology","description":"Phishing emails attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Read here about how to protect your accounts and data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/","og_locale":"en_US","og_type":"article","og_title":"Information Security Reminders - Information Technology","og_description":"Phishing emails attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Read here about how to protect your accounts and data.","og_url":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/","og_site_name":"Information Technology","article_published_time":"2017-08-14T12:15:43+00:00","author":"mike.kirby","twitter_card":"summary_large_image","twitter_misc":{"Written by":"mike.kirby","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/#article","isPartOf":{"@id":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/"},"author":{"name":"mike.kirby","@id":"https:\/\/machias.edu\/it\/#\/schema\/person\/30926f14f19f1bcb98075f4906667ca8"},"headline":"Information Security Reminders","datePublished":"2017-08-14T12:15:43+00:00","mainEntityOfPage":{"@id":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/"},"wordCount":177,"articleSection":["Issue 4","IT News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/","url":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/","name":"Information Security Reminders - Information Technology","isPartOf":{"@id":"https:\/\/machias.edu\/it\/#website"},"datePublished":"2017-08-14T12:15:43+00:00","author":{"@id":"https:\/\/machias.edu\/it\/#\/schema\/person\/30926f14f19f1bcb98075f4906667ca8"},"description":"Phishing emails attempt to obtain sensitive information such as usernames, passwords, and credit card details (and, indirectly, money), often for malicious reasons, by disguising as a trustworthy entity in an electronic communication. Read here about how to protect your accounts and data.","breadcrumb":{"@id":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/machias.edu\/it\/2017\/08\/14\/information-security-reminders\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/machias.edu\/it\/"},{"@type":"ListItem","position":2,"name":"Information Security Reminders"}]},{"@type":"WebSite","@id":"https:\/\/machias.edu\/it\/#website","url":"https:\/\/machias.edu\/it\/","name":"Information Technology","description":"University of Maine","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/machias.edu\/it\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/machias.edu\/it\/#\/schema\/person\/30926f14f19f1bcb98075f4906667ca8","name":"mike.kirby","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e02f20ae98dfefbf6c55e78e21cfb59e2d68f1f863ba9c8d6f3ce5b3ed1237cf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e02f20ae98dfefbf6c55e78e21cfb59e2d68f1f863ba9c8d6f3ce5b3ed1237cf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e02f20ae98dfefbf6c55e78e21cfb59e2d68f1f863ba9c8d6f3ce5b3ed1237cf?s=96&d=mm&r=g","caption":"mike.kirby"},"url":"https:\/\/machias.edu\/it\/author\/mike-kirby\/"}]}},"taxonomy_info":{"category":[{"value":35,"label":"Issue 4"},{"value":11,"label":"IT News"},{"value":1,"label":"Uncategorized"}]},"featured_image_src_large":false,"author_info":{"display_name":"mike.kirby","author_link":"https:\/\/machias.edu\/it\/author\/mike-kirby\/"},"comment_info":"","category_info":[{"term_id":35,"name":"Issue 4","slug":"issue-4","term_group":0,"term_taxonomy_id":41,"taxonomy":"category","description":"","parent":11,"count":7,"filter":"raw","cat_ID":35,"category_count":7,"category_description":"","cat_name":"Issue 4","category_nicename":"issue-4","category_parent":11},{"term_id":11,"name":"IT News","slug":"it-news","term_group":0,"term_taxonomy_id":17,"taxonomy":"category","description":"","parent":0,"count":35,"filter":"raw","cat_ID":11,"category_count":35,"category_description":"","cat_name":"IT News","category_nicename":"it-news","category_parent":0},{"term_id":1,"name":"Uncategorized","slug":"uncategorized","term_group":0,"term_taxonomy_id":6,"taxonomy":"category","description":"","parent":0,"count":18,"filter":"raw","cat_ID":1,"category_count":18,"category_description":"","cat_name":"Uncategorized","category_nicename":"uncategorized","category_parent":0}],"tag_info":false,"_links":{"self":[{"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/posts\/3811","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/users\/15"}],"replies":[{"embeddable":true,"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/comments?post=3811"}],"version-history":[{"count":0,"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/posts\/3811\/revisions"}],"wp:attachment":[{"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/media?parent=3811"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/categories?post=3811"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/machias.edu\/it\/wp-json\/wp\/v2\/tags?post=3811"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}