Cybersecurity Month Build A Better Password Banner

Phish TankPhish Tank
A collection of phishing scams that have attempted to bait the Auburn community.
Phish TankIn page navigation
Changing Your Auburn PasswordUser Lock
Tips and information on changing your Auburn password.
Auburn PasswordIn page navigation
2-Factor AuthenticationDUO
Auburn has implemented DUO as high-security login authentication.
2-Factor Authentication (DUO)In page navigation
LastPassLastPass Logo
Stores links to websites, auto-generates secure passwords and auto-fills password forms.
LassPass InformationIn page navigation
Enables Auburn employees to comply with protecting restricted data.
SpirionIn page navigation
Cybsecurity Awareness TipsSecurity
Auburn Cybersecurity Awareness Month information
Cybersecurity Awareness TipsIn page navigation
Mobile Device SecurityMobile Device
Auburn University's mobile device security requirements.
Mobile Device SecurityIn page navigation
Phishing is an attempt to acquire personal information masquerading as a trustworthy entity.
PhishingIn page navigation
Cybersecurity TrainingSANS
Each day more and more cyber threats are committed against institutions of higher education.
SANS Securing the HumanIn page navigation
Removal Tips, Tools, and Information.
Spyware/MalwareIn page navigation
Virus ProtectionVirus Protection
Everyone at Auburn University is expected to take precautions to protect their computers against viruses.
Virus ProtectionIn page navigation
VPN ClientVPN Client
A VPN provides a secure two-way communication tunnel to the Auburn University network.
VPN ClientIn page navigation
Case In PointCase In Point
Lessons for the pro-active manager
Case In PointIn page navigation
Project CleanupDelete
Improving security and minimizing risk through proper data management
Project CleanupIn page navigation
External ResourcesWeb Resources
External Cybersecurity resources
External ResourcesIn page navigation
Minimum Server StandardsServers
Minimum standards for server administration and security.
Minimum Server StandardsIn page navigation
Minimum Endpoint StandardsLaptop
Minimum standards for endpoint administration and security.
Minimum Endpoint StandardsIn page navigation
Minimum App StandardsApplication Code
Minimum standards for application development and security.
Minimum App StandardsIn page navigation
Data Storage MatrixStorage Device
Standards for data storage by classifiction
Data Storage MatrixIn page navigation
103  or    844-0888 with questions
Kittye Parker

With working and studying from home becoming more and more commonplace, this year's Cybersecurity Month will focus on ways that Auburn University students, faculty, and staff and build a distance defense and stay secure while remote. ​

Use a VPN whenever accessing or using sensitive data.

A VPN (Virtual Private Network) provides a secure two-way communication between your device and the information you're accessing. The Palo Alto GlobalProtect VPN is required in order to use certain Auburn University resources, but that's not the only time you should worry about secure data. Using 3G/4G/5G network data, public Wi-Fi, or even private Wi-Fi where the password is publicly available, can put your information at risk.

  • Financial Information: Online shopping is a breeze through mobile apps, and fast shipping can make it very enticing to complete a purchase as soon as you think about it. But completing an order means that you're transmitting financial information, whether it's bank account details or a debit or credit card number. You run into a similar problem if you access your banking apps or websites. Your password, account and routing number, and transaction history suddenly can become available.
  • Passwords: It may seem harmless to log into your social media while you're out and about, but if you use the same password across multiple accounts, hackers will have access to those as well. In addition to using a VPN for your browsing, you should also make sure that you use different passwords across all your accounts in the event that one is compromised. If that seems like a daunting task, you can store your passwords in a vault like LastPass.
  • Location Data: Many apps require access to your location data to provide you appropriate content. The convenience of finding restaurants, dates, and deals near you is very appealing! But consider the fact that other people may be able to find you if your location data gets transmitted over public networks. Not only may that lead to unsavory characters finding you on your night out, but it could also provide data for potential criminals who need to get you away from your house. Using a VPN gives you a lot more control over who can access that information.


Don't open links or files from unknown sources.

Phishing is constantly becoming more and more problematic as tens of thousands of people fall for phishing scams every single day. This can negatively affect the people who fall for the scams as well as anyone in their contacts or on the same network. It doesn't help that scammers are getting more sophisticated in their attacks, but there are still some red flags you can be on the lookout for:

  • Links: It's easy to make a link look like it's directing you somewhere else, so don't click on a link in an email you're not expecting. Instead, type in the web address directly into the browser. You should also be wary of links on unsecured websites.
  • Attachments: You may receive emails with attachments that look like simple documents or photos, but only open files from known senders, and even then, make sure you're expecting it. Innocuous looking files make still contain data and can install a virus or some other malware that can wreak havoc on your device.
  • Impersonal Greetings: Phishing messages often start with “Dear User" or “Dear Customer" instead of addressing you by name.
  • Threats: Be wary of any message that tells you that you will lose access immediately or that your account will be terminated.
  • Spelling & Grammar: Plenty of people make mistakes in spelling in emails, but phishing attacks often have more spelling and grammar issues than normal.
  • Request for Money or Information: If an email ever asks you to enter your password, banking information, social security number, or anything like that via email, don't do it. Legitimate companies will not request that information via email.

If you're worried you may have fallen for a phishing scam, or if you want more information on phishing, visit our Phishing Awareness page.


Beware of job, tax, and other financial scams.

When you're not working face-to-face with someone, a lot of correspondence happens through emails and text. Those forms of communication are easy to fake, so remote work is a great time for scammers to get your money or personal information. Here are some common scams to be aware of:

  • The Gift Card: This scam starts with an email typically asking if you are available. The account is made to look like it belongs to someone from Auburn and in your organizational structure, so many people quickly respond if they are available. The sender then requests that you purchase a gift card and send the redemption code or a picture of the card back via email. Whenever you get odd email requests, make sure to confirm the identity of the sender!
  • The Prize: This scam has been around for years, and it's not going anywhere. Whether it's via email, text message, or browser pop-up, be very skeptical if a message tells you that you've won some amazing prize. The “fine print" may ask you to enter banking information to pay for shipping, enter your social security number for tax purposes, or enter a username and password to confirm your identity. Be extremely careful about where you enter any sensitive information into any site or email.
  • The Job Offer: There are many variations of this scam ranging from temporary gigs to full-time employment, but they tend to show up more often near the end of semesters. And since there was a high rate of layoffs at the beginning of the pandemic, there has also been a big surge over the past 6 months. There's typically a “trial task" that involves making a purchase, paying a bill, or transferring money with the promise that you'll be reimbursed above what you spend. Never accept a job that requires a money transfer or something similar and be extra cautious with any job offer where you didn't apply.
  • The Stimulus Check: This particular scam has only become common since the start of the COVID-19 pandemic, but it has been rampant throughout 2020. The federal government has already provided one round of economic impact payments, and congress has been discussing another round for months. As long as a discussion of more payments persists, this scam will as well. Most people didn't have to do anything to get these payments other than wait – but that waiting can be difficult. Some scammers were offering you the chance to get your payments sooner, for a small fee, of course. Some scammers were calling or texting to request your Social Security number in order to confirm your payment, but the IRS already has that information. And if you do need to provide information, it should only be directly through the IRS website. If you think you've encountered a scam of these nature, contact the Federal Trade Commission.


Create secure backups of all your important files.

Your data is the most important thing on your computer. Be it family photos, important tax documents, pieces of art, your band's music, sensitive research papers, or anything else, losing it should simply not be an option. Unfortunately, computers fail, and often. Having a backup plan set before anything goes wrong is one of the most important tasks you will undertake as a responsible computer user. Just make sure that any personal data is in a secure, encrypted location.

  • Manually Backing Up Files: The most basic method to back up files is to simply copy/paste them to another resource such as a flash drive, external hard drive, shared network drive, or writeable media (such as a CD or DVD). System files should not be backed up. Instead focus on your personal files. And if you have sensitive files, consider purchasing an encrypted flash drive for those items.  
  • Using a Backup Program: There are a number of programs that you can use to assist you and automatically schedule backing up of files to local resources. Mac users should consider using Time Machine.
  • Backing Up to the Cloud: A number of cloud services provide ample secure storage to backup your personal files, such as OneDrive for Business, Box, Google Drive, DropBox, iCloud, etc. Work-related files that don't contain confidential information should be limited to OneDrive for Business and Box.​

Published: 10/2/2020 5:02 PM
# Comments: 0
William Miaoulis

As the United States and the world deal with the ongoing pandemic, the FBI’s national security and criminal investigative work continues. There are threats you should be aware of so you can take steps to protect yourself.  

  • Children who are home from school and spending more time online may be at increased risk for exploitation.
  • Anyone can be targeted by hackers and scammers.
  • Protecting civil rights and investigating hate crimes remain a high priority for the FBI.

Use the resources on the FBI page to help keep yourself and your family safe from these and other threats.

Published: 4/23/2020 8:57 AM
# Comments: 0
William Miaoulis

Cybercriminals are not taking a Covid-19 break and they are accustomed to working from home.   Our obligation to protect data does not go away.  Together we can minimize the exposure to Auburn Data by practicing good Cybersecurity standards.  Here are some policies and tips:

  • Turn off your equipment and sanitize the keyboard and mouse by using a disinfectant wipe or a soft, linen-free cloth dipped in isopropyl alcohol. Rub the cloth or wipe on the top and sides of each key and then clean the surface and bottom of the keyboard thoroughly. Use a new disinfectant wipe or cloth to clean the mouse.
  • Do not store any non-public Auburn University information on personal devices or personal storage locations.    If necessary the machine should be encrypted.
  • Be extra cautious of emails that contain links as many on-site protections are not available from off-campus.
  • All remote access to the Auburn network will continue to require the use of OIT approved two factor authentication; this includes but is not limited to VPNs, Remote Desktop Programs, Secure Shell (SSH) and Virtual Desktop Infrastructure access.   
  • It is preferred that individuals utilize Auburn Owned Equipment, contact your department to determine if you can take equipment (Desktops, Monitors, etc.) home and do it today. 
  • If you must use personal equipment, you should:
    • Ensure you are operating supported operating systems (No Windows 7, etc.) and that it is up to date.
    • Utilize up to date anti-virus equipment
  • Do not allow family members to have access to the Auburn Network by logging out of the Auburn network when completing your work
  • Sanitize your phone:
    • If you have them, use a disinfectant wipe on your phone. (Lysol, Clorox, etc.).  Unplug all cables and turn off your phone prior to cleaning.  (Older phones are more susceptible to scratching, but the risk is to high not to clean)
    • Do not use your phone while eating.
    • Apple recently updated their language on their website on how you can clean their products.   "Using a 70 percent isopropyl alcohol wipe or Clorox Disinfecting Wipes, you may gently wipe the hard, nonporous surfaces of your Apple product, such as the display, keyboard, or other exterior surfaces. Don't use bleach. Avoid getting moisture in any opening, and don't submerge your Apple product in any cleaning agents. Don't use on fabric or leather surfaces," Apple said.
    • Your iPhone has a fingerprint-resistant oleophobic—oil repellent—coating. Cleaning products and abrasive materials will diminish the coating and might scratch your iPhone. (Do it anyway)


Published: 3/16/2020 7:49 AM
# Comments: 0
1 - 3Next
Retrieving Data
Retrieving Data