{"id":23664,"date":"2020-05-05T11:31:37","date_gmt":"2020-05-05T15:31:37","guid":{"rendered":"https:\/\/tech.msu.edu\/?p=23664"},"modified":"2023-07-25T10:36:48","modified_gmt":"2023-07-25T14:36:48","slug":"fightingcybercrime","status":"publish","type":"post","link":"https:\/\/tech.msu.edu\/news\/2020\/05\/fightingcybercrime\/","title":{"rendered":"MSU IT and MSU Police Unite to Fight Cybercrime"},"content":{"rendered":"<p>As the coronavirus pandemic unfolds, stories of campus heroes have emerged. From <a href=\"https:\/\/msutoday.msu.edu\/news\/2020\/msu-health-care-offers-drive-through-testing-for-covid-19\/\">healthcare workers on the frontline<\/a> to <a href=\"https:\/\/msutoday.msu.edu\/news\/2020\/msu-colleges-collaborate-to-create-3d-printed-medical-face-shields-in-response-to-covid-19-crisis\/\">homemade 3D-printed face shields<\/a>, Spartans are coming together to support those in need. While heroes provide care, malicious actors are using the crisis to exploit others online.<\/p>\n<p>Recently, the FBI <a href=\"https:\/\/www.fbi.gov\/coronavirus\">reported<\/a> a significant increase in coronavirus-related scams and cyberattacks, some of which have been directed toward the Michigan State University community. In response, MSU IT and MSU Police are working together and sharing resources to prevent, respond, and remedy these attacks.<\/p>\n<p><a href=\"https:\/\/tech.msu.edu\/wp-content\/uploads\/2020\/05\/csecure.png\" rel=\"attachment wp-att-23683\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-23683 alignright\" src=\"https:\/\/tech.msu.edu\/wp-content\/uploads\/2020\/05\/csecure.png\" alt=\"\" width=\"369\" height=\"203\" \/><\/a>MSU IT Interim Chief Information Security Officer Daniel Ayala said cybercriminals taking advantage of a crisis is nothing new. \u201cTimes of uncertainty impel people to seek answers to difficult questions,\u201d Ayala said. \u201cThis creates opportunities for cybercriminals to manipulate them to do something they wouldn\u2019t normally do.\u201d A common tactic, known as phishing, is the use of emails appearing to be from a trusted source. Disguised as medical professionals or government agencies, these messages often carry attachments loaded with malware. Others include links to fake versions of real websites designed to steal your login credentials or personal information.<\/p>\n<p>\u201cCybercriminals use many angles to separate you from your money and information,\u201d Ayala said. \u201cPlaying to pandemic fears, they promise access to vaccines, cures, treatments, and vital information for the virus and related illnesses.\u201d<\/p>\n<p>Beware of requests for personal or financial data purported to be used for charitable contributions or expedited access to government loans or fiscal stimulus. \u201cCriminals use language to make it seem that your inaction to respond to their message will result in a loss of opportunity,\u201d Ayala said. \u201cThis is a red flag.\u201d<\/p>\n<p>Detective Sergeant James Terrill from MSU Police\u2019s Digital Forensics and Cyber Crime Unit said, \u201cThere are no shortcuts; If it sounds too good to be true, it probably is. Legitimate entities will never ask for your personal or financial information over the phone or through email.\u201d If you receive a suspicious email or communication, Terrill and Ayala say that the best response is to delete it without opening it or clicking any attachments. If in doubt, simply call a valid number for the person or organization who sent it to verify the information.<\/p>\n<p>Perhaps the most important part of cyberattack prevention\u00ad\u00ad is education, according to Ayala. \u201cSound cybersecurity practices are everyone\u2019s responsibility.\u201d He recommends taking preventative measures, such as <a href=\"https:\/\/secureit.msu.edu\/safe-computing\/index.html\">safeguarding devices<\/a>, <a href=\"https:\/\/secureit.msu.edu\/passwords\/index.html\">creating secure passwords<\/a>, and <a href=\"https:\/\/secureit.msu.edu\/phishing\/index.html\">learning how to spot a phish<\/a>.<\/p>\n<p>&#8220;In law enforcement, when we get a call, it is typically something bad,\u201d said Terrill. \u201cWe don&#8217;t want that to overshadow the great work good people are doing every day. Our hope is that the community takes some time to learn how to stay safe online.\u201d<\/p>\n<p>Find more IT security tips and resources at <a href=\"https:\/\/secureit.msu.edu\/\">secureit.msu.edu<\/a>. For IT-related questions or concerns, contact MSU IT Service Desk by phone (517-432-6200 or 844-678-6200), email\u00a0<a href=\"https:\/\/ithelp.msu.edu\">ithelp@msu.edu<\/a>, or\u00a0<a href=\"https:\/\/go.msu.edu\/itchat\">chat<\/a>.<\/p>\n<p>If you believe you are the victim of a cybercrime, contact MSU Police at 517-355-2221 or your local police department. Visit\u00a0<a href=\"https:\/\/police.msu.edu\/\">police.msu.edu<\/a>\u00a0for more information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the coronavirus pandemic unfolds, stories of campus heroes have emerged. From healthcare workers on the frontline to homemade 3D-printed face shields, Spartans are coming together to support those in need. While heroes provide care, malicious actors are using the crisis to exploit others online. Recently, the FBI reported a significant increase in coronavirus-related scams&#8230;  <a class=\"excerpt-read-more\" href=\"https:\/\/tech.msu.edu\/news\/2020\/05\/fightingcybercrime\/\" title=\"Read MSU IT and MSU Police Unite to Fight Cybercrime\">Read more &raquo;<\/a><\/p>\n","protected":false},"author":79,"featured_media":23683,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[7,1],"tags":[2394,2395,2393,216,165,159,34],"jetpack_publicize_connections":[],"acf":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/tech.msu.edu\/wp-content\/uploads\/2020\/05\/csecure.png","jetpack_shortlink":"https:\/\/wp.me\/p6GvV1-69G","_links":{"self":[{"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/posts\/23664"}],"collection":[{"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/users\/79"}],"replies":[{"embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/comments?post=23664"}],"version-history":[{"count":22,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/posts\/23664\/revisions"}],"predecessor-version":[{"id":28111,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/posts\/23664\/revisions\/28111"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/media\/23683"}],"wp:attachment":[{"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/media?parent=23664"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/categories?post=23664"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tech.msu.edu\/wp-json\/wp\/v2\/tags?post=23664"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}