{"id":23677,"date":"2023-10-13T08:07:55","date_gmt":"2023-10-13T12:07:55","guid":{"rendered":"https:\/\/www.montclair.edu\/information-technology\/?p=23677"},"modified":"2023-10-13T08:07:55","modified_gmt":"2023-10-13T12:07:55","slug":"it-security-tips-wanted-frankenphisher-national-cyber-security-awareness-month","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/information-technology\/2023\/10\/13\/it-security-tips-wanted-frankenphisher-national-cyber-security-awareness-month\/","title":{"rendered":"(IT Security Tips) Wanted: Frankenphisher (National Cyber Security Awareness Month)"},"content":{"rendered":"<p>Frankenphisher is stitched together from all the most dangerous pieces of phishing emails; compromised links, malicious attachments, you name it! Before he gets a chance to bust down the door of our networks, make sure you know what makes a\u00a0<a rel=\"noopener\" href=\"https:\/\/www.montclair.edu\/information-technology\/security\/phishing-information\/#what-is-phishing\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.montclair.edu\/information-technology\/security\/phishing-information\/%23what-is-phishing&amp;source=gmail&amp;ust=1697285064203000&amp;usg=AOvVaw2eDxCjeXEUSoNPmPrRb_Dx\">phishy email phishy<\/a>.<\/p>\n<p><strong>Targets:<\/strong>\u00a0Users that don&#8217;t check links using the\u00a0<a rel=\"noopener\" href=\"http:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/#hover-over\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=http:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/%23hover-over&amp;source=gmail&amp;ust=1697285064203000&amp;usg=AOvVaw31_SRK9OB-mQ0B9eRhFd-J\">&#8220;hover over&#8221; technique<\/a>, are not cyber security aware (haven&#8217;t completed the free\u00a0<a rel=\"noopener\" href=\"https:\/\/www.montclair.edu\/information-technology\/security\/cybersecurity-awareness-training\/\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.montclair.edu\/information-technology\/security\/cybersecurity-awareness-training\/&amp;source=gmail&amp;ust=1697285064203000&amp;usg=AOvVaw3diqU379-8JG82gmVN-mCL\">training<\/a>\u00a0the University offers!), let their cyber awareness guard down, etc.<\/p>\n<p><strong>Monster&#8217;s Weaknesses:<\/strong>\u00a0Critical thinking, patient link clickers, fire<\/p>\n<p><strong>Bonus tip<\/strong>: Always use the &#8220;<em>hover over<\/em>&#8221; technique to check web links before clicking! To learn how, go to:\u00a0<a rel=\"noopener\" href=\"https:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/#hover-over\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/%23hover-over&amp;source=gmail&amp;ust=1697285064203000&amp;usg=AOvVaw1DQKzOAGQ5h7ZbGE0P52Ay\">www.montclair.edu\/information-technology\/security\/security-tips\/#hover-over<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Frankenphisher is stitched together from all the most dangerous pieces of phishing emails; compromised links, malicious attachments, you name it! Before he gets a chance to bust down the door of our networks, make sure you know what makes a\u00a0phishy email phishy. Targets:\u00a0Users that don&#8217;t check links using the\u00a0&#8220;hover over&#8221; technique, are not cyber security [&hellip;]<\/p>\n","protected":false},"author":368,"featured_media":23678,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[80,34],"class_list":["post-23677","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-cyber-security","tag-security"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23677","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/users\/368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=23677"}],"version-history":[{"count":1,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23677\/revisions"}],"predecessor-version":[{"id":23679,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23677\/revisions\/23679"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media\/23678"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=23677"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=23677"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=23677"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}