blue spacer


Cybersecurity Tips

Video Source: U.S. Department of Homeland Security/DHS Video by Science & Technology Directorate/Released

How to Protect Yourself
Remember that companies generally don’t contact you to ask for your username or password.

Don’t click on anything in an unsolicited email or text message. Look up the company’s phone number on your own (don’t use the one a potential scammer is providing), and call the company to ask if the request is legitimate.

Carefully examine the email address, URL, and spelling used in any correspondence. Scammers use slight differences to trick your eye and gain your trust.

Be careful what you download. Never open an email attachment from someone you don’t know and be wary of email attachments forwarded to you.

Set up two-factor (or multi-factor) authentication on any account that allows it, and never disable it.

Be careful with what information you share online or on social media. By openly sharing things like pet names, schools you attended, family members, and your birthday, you can give a scammer all the information they need to guess your password or answer your security questions.

Source: Federal Bureau of Investigation:


Cyber criminals exploit people and steal confidential and sensitive information through various email-based strategies. Beware of the following:


Spam is unsolicited email, instant messages, or social media messages. These messages are fairly easy to spot and can be damaging if you open or respond.


Phishing is an email sent from an Internet criminal disguised as an email from a legitimate, trustworthy source. The message is meant to lure you into revealing sensitive or confidential information.

Spear Phishing

Spear Phishing occurs when criminals obtain information about you from websites or social networking sites, and customize a phishing scheme to you.


Spoofing describes a criminal who impersonates another individual or organization, with the intent to gather personal or business information.


Pharming is a malicious website that resembles a legitimate website, used to gather usernames and passwords.
Source: Texas Tech University Cybersecurity Awareness Program: Lubbock


KnowBe4 helps organizations address the human element of security by raising awareness about ransomware, CEO fraud, and other social engineering tactics through a new-school security training approach.

Don’t click on suspicious links

Phishing or spam emails may contain links or attachments that include malicious code.

Do not forward these emails to others, even if attempting to confirm if it is real.

Verify the Sender

Even if you recognize the sender’s name, you should verify that you recognize the sender’s email address.

Remain cautious—even known email addresses can be spoofed or hacked.

Confirm through safe channels

If you are unsure if an email is legitimate or not, reach out to the sender using another safe channel.

Do not reply to the email or call a phone number included in that email.

Security > Urgency

Phishing attempts often contain time-sensitive threats or a sense of urgency.

Never send sensitive information over email and always be skeptical of urgent and unexpected requests.

The owner of this website has made a commitment to accessibility and inclusion, please report any problems that you encounter using the contact form on this website. This site uses the WP ADA Compliance Check plugin to enhance accessibility.