Sorry, but nothing matched your search terms. Please try again with some different keywords.

Most recent posts:

Our Spring 2024 Newsletter

In This Issue UPdate From the Executive Director! As the academic year draws to a close, we eagerly anticipate the arrival of summer’s warmth and a chance to spend some time with our families.  And while summer vacations are on the horizon, we remain vigilant in addressing several ongoing challenges.   Our team continues to closely monitor the turmoil that has been seen in the FASFA (Free Application for Federal Student Aid) process and are working with our schools to implement the appropriate application updates as they become available.  Artificial Intelligence (AI) is another key component that requires scrutiny as it

In This Issue UPdate From the Executive Director! As the academic year draws to a close, we eagerly anticipate the arrival of summer’s warmth and a chance to spend some time with our families.  And while summer vacations are on the horizon, we remain vigilant in addressing several ongoing challenges.   Our team continues to closely monitor the turmoil that has been seen in the FASFA (Free Application for Federal Student Aid) process and are working with our schools to implement the appropriate application updates as they become available.  Artificial Intelligence (AI) is another key component that requires scrutiny as it

Security Hints + Tips — Pretexting

Pretexting is when the bad guys create a false scenario using a made-up identity or pose as someone you know. They can even pose as employees of bank or credit card companies to manipulate you into divulging personal or sensitive information. How it Works: Common Tactics of InfluenceThe bad guys will try to persuade you into giving them sensitive information. Oftentimes, the information that they need is not specific to your organization. Below are examples of two common tactics used to influence victims in pretexting scenarios: Pretexting with AuthorityYou receive a call at work from someone demanding immediate assistance. They

Pretexting is when the bad guys create a false scenario using a made-up identity or pose as someone you know. They can even pose as employees of bank or credit card companies to manipulate you into divulging personal or sensitive information. How it Works: Common Tactics of InfluenceThe bad guys will try to persuade you into giving them sensitive information. Oftentimes, the information that they need is not specific to your organization. Below are examples of two common tactics used to influence victims in pretexting scenarios: Pretexting with AuthorityYou receive a call at work from someone demanding immediate assistance. They

WVOT Planned Power Outage

UPDATE 04/05/2024 at 10:00 PM: WVOT has completed the physical UPS installation. Network connectivity has been restored and additional agency services are continuing to come back online.

UPDATE 04/05/2024 at 10:00 PM: WVOT has completed the physical UPS installation. Network connectivity has been restored and additional agency services are continuing to come back online.

Security Hints + Tips

Don’t Be Fooled by Workspace Tools Many organizations use platforms such as Microsoft Teams, Google Drive, or Zoom to stay connected. Unfortunately, these trusted communication tools can lead to a false sense of security. Just like with traditional email, bad guys can use these platforms to launch a cyber attack. Below are three examples of how cybercriminals use these platforms for phishing—and what you can do to keep your organization safe Lurking Recently, a cybercriminal gained access to an organization’s Microsoft Teams channel, which is similar to a group message or a chat room. The scammer lurked in the channel

Don’t Be Fooled by Workspace Tools Many organizations use platforms such as Microsoft Teams, Google Drive, or Zoom to stay connected. Unfortunately, these trusted communication tools can lead to a false sense of security. Just like with traditional email, bad guys can use these platforms to launch a cyber attack. Below are three examples of how cybercriminals use these platforms for phishing—and what you can do to keep your organization safe Lurking Recently, a cybercriminal gained access to an organization’s Microsoft Teams channel, which is similar to a group message or a chat room. The scammer lurked in the channel

We use cookies to enhance your browsing experience and analyze website traffic. By continuing to use our site, you consent to the use of cookies. Click here to opt-out.