  {"id":23706,"date":"2023-10-31T14:13:17","date_gmt":"2023-10-31T18:13:17","guid":{"rendered":"https:\/\/www.montclair.edu\/information-technology\/?p=23706"},"modified":"2023-10-31T14:13:17","modified_gmt":"2023-10-31T18:13:17","slug":"wanted-spoofy-steve-national-cyber-security-awareness-month","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/information-technology\/2023\/10\/31\/wanted-spoofy-steve-national-cyber-security-awareness-month\/","title":{"rendered":"Wanted: Spoofy Steve (National Cyber Security Awareness Month)"},"content":{"rendered":"<p><strong>Description<\/strong>: Wrapped in ancient layers of digital cloth, Spoofy Steve hides his scammy intentions from all but the most insightful of employees. Using well-honed\u00a0<a rel=\"noopener\" href=\"https:\/\/www.cisa.gov\/news-events\/news\/avoiding-social-engineering-and-phishing-attacks\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.cisa.gov\/news-events\/news\/avoiding-social-engineering-and-phishing-attacks&amp;source=gmail&amp;ust=1698855545900000&amp;usg=AOvVaw3787JWwvTYuuZPO4m8vza_\">social-engineering<\/a>\u00a0skills he pretends to be someone else like a co-worker or supervisor, long lost friend, or an emissary from a foreign land in an effort to trick you into sharing sensitive information (or buying gift cards).<\/p>\n<p><strong>Targets:<\/strong>\u00a0Everyone! But he loves social media users\u00a0that post too much personal information online.<\/p>\n<p><strong>Monster&#8217;s Weaknesses:\u00a0<\/strong>Users that\u00a0<a rel=\"noopener\" href=\"https:\/\/www.montclair.edu\/information-technology\/security\/phishing-information\/#identify-phishing-attack\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.montclair.edu\/information-technology\/security\/phishing-information\/%23identify-phishing-attack&amp;source=gmail&amp;ust=1698855545900000&amp;usg=AOvVaw1Fxu-QrdJc-2__1ge0asah\">confirm information before acting on it,<\/a>\u00a0high humidity<\/p>\n<p><strong>Bonus tip<\/strong>: Always use the &#8220;<em>hover over<\/em>&#8221; technique to check web links before clicking! To learn how, go to:\u00a0<a rel=\"noopener\" href=\"https:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/#hover-over\" target=\"_blank\" data-saferedirecturl=\"https:\/\/www.google.com\/url?q=https:\/\/www.montclair.edu\/information-technology\/security\/security-tips\/%23hover-over&amp;source=gmail&amp;ust=1698855545900000&amp;usg=AOvVaw2VSVHW7DzhL1vyzCkRIPmt\">www.montclair.edu\/information-technology\/security\/security-tips\/#hover-over<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Description: Wrapped in ancient layers of digital cloth, Spoofy Steve hides his scammy intentions from all but the most insightful of employees. Using well-honed\u00a0social-engineering\u00a0skills he pretends to be someone else like a co-worker or supervisor, long lost friend, or an emissary from a foreign land in an effort to trick you into sharing sensitive information [&hellip;]<\/p>\n","protected":false},"author":368,"featured_media":23707,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[12],"tags":[69,34],"class_list":["post-23706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-information-security","tag-information-security","tag-security"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/users\/368"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/comments?post=23706"}],"version-history":[{"count":1,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23706\/revisions"}],"predecessor-version":[{"id":23708,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/posts\/23706\/revisions\/23708"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media\/23707"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/media?parent=23706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/categories?post=23706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/information-technology\/wp-json\/wp\/v2\/tags?post=23706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}