Five Ways to Engage Your Shield Against Attacks

 

 

1. Resist the Rush

Social engineers often create a tremendous sense of urgency, such as telling you there is a tight deadline, to trick you into making a mistake. If someone pressures you to bypass or ignore our policies, it is most likely an attack

 

2. Recognize the ‘Bag of Tricks’


Social engineers use emotions, such as fear, intimidation, curiosity, or excitement, to get you to do what they want. If something sounds suspicious or too good to be true, it probably is.

 

3. Think Before You Click


Social engineers want you to carelessly click on links and not think twice before opening attachments. Be cautious: one wrong move could infect your device and spread it o others.

 

4. Don’t Just Download It or Plug It In


Social engineers count on you to download unapproved software or plugin infected USB drives or external devices. Only use authorized hardware and software. If you are not sure if something is authorized, just ask.

5. Ask Questions, and If It Feels Odd or Suspicious, Contact Security


If you feel you are experiencing a social engineering attack, hang up the phone (or do not respond to the email), and contact security right away.

 

If you have any further questions, email servicedesk@qatar.tamu.edu or call us at (974) 4423-0009.