It’s a trap! Why so many phishing attacks succeed

Phishing attacks can take many forms, but they all share a common goal—getting you to share sensitive information, such as login credentials, credit card information, or other restricted and/or sensitive data. Although the University of Utah maintains controls to help protect our networks and computers from cyberthreats, we rely on you to be our first line of defense.

Click here to learn more about why phishing attacks succeed and how you can protect yourself from them.

Learn more: Cybersecurity Awareness Month

This month, please consider taking a few moments to visit the Information Security Office’s CSAM website and check up on your cyber hygiene. Topics include:

We’re also hosting a weekly scavenger hunt online. Bookmark our scavenger hunt page or follow @uofu_iso on Twitter to play along.