<?xml version="1.0"?>
<News hasArchived="false" page="1" pageCount="1" pageSize="10" timestamp="Fri, 01 May 2026 01:12:43 -0400" url="https://beta.my.umbc.edu/groups/bethekey/posts.xml?tag=security">
<NewsItem contentIssues="false" id="83411" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/83411">
<Title>Recent Phishing Attempts At UMBC</Title>
<Body>
<![CDATA[
    <div class="html-content"><span><p><span>Whether you are a student, teacher, or any other faculty member, we all have different goals and aspirations in our everyday lives at UMBC. What we all have in common in this community is making sure our personal information stays secure.  One issue you must be aware of is the phishing that many accounts have encountered.</span></p><br><p><span>Phishing is the use of deception to acquire sensitive information from a person. One strategy of this is where hackers create fake emails to connect to a number of users. This strategy is very common, and surprisingly many users fall into this trap simply for lack of knowledge. Phishing is very threatening because when it is successful, cybercriminals may gain access to your personal information and potentially stealing money. This could result in financial loss.</span></p><br><p><span>DoIT has recently been notified by several users that they have received what appear to be phishing attempts. These messages may demand the user to pay a ransom to prevent the release of potentially damaging information (a process known as sexploitation, from sexual exploitation), purchase illegitimate computer software to ensure system stability, or ask if the user is available to purchase gift cards.  These messages are coming from fake email accounts pretending to be supervisors, admins, staff members, or other well-known people. If you receive an email that is from a high-profile or an authoritative person at UMBC, please be alert and make sure the email is from an authentic source. </span></p><br><p><span> If you receive an email that is not from a umbc.edu account, please be aware that this email can potentially be a phishing attempt. You can verify whether or not the message is authentic by checking the email address. Some of the phishing emails that have been reported came from “my.com” and “</span><a href="mailto:umbc.edu@gmail.com" rel="nofollow external" class="bo"><span>umbc.edu@gmail.com</span></a><span>” accounts. Another strategy is seeing what they are asking for. Phishing messages tend to demand for money in unusual circumstances. Also, it is valuable to analyze the “from,” “to,” “date,” and “subject” line of the email. If some or all of these components seem to be illogical,  you can send a message to </span><a href="mailto:secuirty@umbc.edu" rel="nofollow external" class="bo"><span>security@umbc.edu</span></a><span> and they will assist you to finalize the emails legitimacy. </span></p><br><p><span>DoIT is currently working on this issue and has notified the site owner whenever a phishing email has been reported. If you see an email that does not seem to be authentic, take a step back, slow down, stay focused, and think before you go any further with the suspicious email and respond accordingly. </span></p><div><span><br></span></div></span></div>
]]>
</Body>
<Summary>Whether you are a student, teacher, or any other faculty member, we all have different goals and aspirations in our everyday lives at UMBC. What we all have in common in this community is making...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/83411/guest@my.umbc.edu/80ce9f68de651ef1ffba3c42a233aece/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>5</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 03 Apr 2019 10:58:36 -0400</PostedAt>
<EditAt>Tue, 30 Apr 2019 15:56:39 -0400</EditAt>
</NewsItem>

<NewsItem contentIssues="true" id="81102" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/81102">
<Title>Backing Up Data</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>What is
    <strong>Backup?</strong></span></p>
    
    <p><strong><span>Backup </span></strong><span>is for
    recovery from hardware failure or recent data corruption or loss.</span></p>
    
    <p><span>Why <strong>Backup</strong> is needed?<strong></strong></span></p>
    
    <p><span>A
    Backup is copy of your data that is made in order to protect against loss of
    that data. Typically, backups are made on a regular basis to a time schedule or
    when the original data should be updated. Usually original data is not deleted,
    but older backups are often deleted in favor of newer ones.</span></p>
    
    <p><strong><span>There
    are various ways to backing up data</span></strong></p>
    
    <p><span>1.Keep
    it in the cloud</span></p>
    
    <p><span>2. Save
    it to an external Hard Drive</span></p>
    
    <p><span>3.Burn
    it at a CD, DVD, or Blue- ray Disc</span></p>
    
    <p><span>4. Put
    it on a USB Flash Drive</span></p>
    
    <p><span>Usually
    Desktop computers, VMs, and mobile devices are all commonly backed up. Backups
    can include data, OS and application files, or a combination of these according
    to the backup methodology and purpose.</span></p>
    
    <p><span>The
    goal of a backup is to make a copy of anything in current use that can’t afford
    to be lost. A backup of a desktop or mobile device might include just the user
    data so that a previous version of a data can be recovered if necessary.</span></p>
    
    <p><span>In the case
    of a </span><a href="https://www.backblaze.com/blog/complete-guide-ransomware/l" rel="nofollow external" class="bo"><span>ransomware attack</span></a><span>, a solid
    backup strategy can mean the difference between being able to restore a
    compromised system and having to pay a ransom in the vague hopes of getting a
    decryption key to obtain access to files that are no longer available because
    they were encrypted by the attacker.</span></p>
    
    <p><span>Backups can
    have additional uses. A user might go to a backup to retrieve an earlier
    version of a file because it contains something no longer in the current file,
    or, as is possible with some backup services such as <a href="https://www.backblaze.com/cloud-backup.html" rel="nofollow external" class="bo"><span>Backblaze
    Backup</span></a>, to share a file with a colleague or other person.</span></p>
    
    <p><span>In my
    opinion, Cloud storage is considered as most convenient and flexible data
    backup.</span></p>
    
    <p><span>There are
    some versions of cloud storage: iCloud, Google Drive, One Drive and Dropbox.</span></p>
    
    </div>
]]>
</Body>
<Summary>What is Backup?    Backup is for recovery from hardware failure or recent data corruption or loss.    Why Backup is needed?    A Backup is copy of your data that is made in order to protect...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/81102/guest@my.umbc.edu/15e197df3871f0bc1db63ba9c81a13ca/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<ThumbnailUrl size="xxlarge">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/xxlarge.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="xlarge">https://assets2-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/xlarge.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="large">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/large.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="medium">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/medium.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="small">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/small.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="xsmall">https://assets1-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/xsmall.jpg?1545150947</ThumbnailUrl>
<ThumbnailUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/thumbnails/news/000/081/102/37bc108d183ddef580a3706467adf7ff/xxsmall.jpg?1545150947</ThumbnailUrl>
<PawCount>0</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 18 Dec 2018 11:33:44 -0500</PostedAt>
<EditAt>Tue, 18 Dec 2018 11:36:10 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="80950" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/80950">
<Title>Hotspots and Public Wi-Fi</Title>
<Body>
<![CDATA[
    <div class="html-content"><p><span>Public Wi Fi is famous with its easily availability and free
    access. Any person with their computer or other devices can access Public Wi
    -Fi. Public Wi -Fi could be found in convenient places such as universities,
    libraries, airports, coffee shops and hotels. In the case when you connect to Public
    Wi -Fi there is a threat that someone might access the data you are sending to
    your colleague or boss.</span></p>
    
    <p><span>To protect your data while we are using Public Wi-Fi, send
    your information to only to sites that are trusted and fully encrypted, and
    avoid using mobile apps that require personal and financial information.</span></p>
    
    <p><span>Regardless what we are doing connecting to Public Wi -Fi
    considered incredibly dangerous. There are some suggestions while you are
    connected to Public Wi – Fi.</span></p><ul><li><span>Do not touch any of your personally identifiable information (PII)</span></li><li><span>Use virtual private networks (VPN) instead</span></li><li><span>Turn of sharing</span></li></ul><div><span>Here are some useful tips from internet security experts:</span></div><div><span><br></span></div>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Be aware</span></strong><span><br>
    Public Wi-Fi is inherently insecure — so be cautious. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Remember —
    any device could be at risk</span></strong><span><br>
    Laptops, </span><a href="https://usa.kaspersky.com/resource-center/threats/smartphones" rel="nofollow external" class="bo"><span>smartphones</span></a><span> and
    tablets are all susceptible to the wireless security risks. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Treat all
    Wi-Fi links with suspicion</span></strong><span><br>
    Don’t just assume that the Wi-Fi link is legitimate. It could
    be a bogus link that has been set
    up by a cybercriminal that’s trying to capture valuable,
    personal information from unsuspecting users. Question everything — and
    don’t connect to an unknown or unrecognised wireless access
    point. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Try
    to verify it’s a legitimate wireless connection</span></strong><span><br>
    Some bogus links — that have been set up by malicious
    users — will have a connection name that’s deliberately similar
    to the coffee shop, hotel or venue that’s offering free Wi-Fi.
    If you can speak with an employee at the location that’s providing
    the public Wi-Fi connection, ask for information about their legitimate Wi-Fi
    access point — such as the connection’s name and IP
    address. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Use a VPN
    (virtual private network)</span></strong><span><br>
    By using a VPN when you connect to a public Wi-Fi network,
    you’ll effectively be using a ‘private tunnel’ that encrypts all
    of your data that passes through the network. This can help
    to prevent cybercriminals — that are lurking on the
    network — from intercepting your data. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Avoid using
    specific types of website</span></strong><span><br>
    It’s a good idea to avoid logging into websites where there’s
    a chance that cybercriminals could capture your identity, passwords
    or personal information — such as social networking sites,
    online banking services or any websites that store your credit card
    information. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Consider using
    your mobile phone</span></strong><span><br>
    If you need to access any websites that store or require the
    input of any sensitive information — including social
    networking, </span><a href="https://usa.kaspersky.com/resource-center/preemptive-safety/online-shopping" rel="nofollow external" class="bo"><span>online shopping</span></a><span> and
    online banking sites — it may be worthwhile accessing them via
    your mobile phone network, instead of the public Wi-Fi connection. <br>
    </span></p>
    
    <p><span><span>·<span>      
    </span></span></span><strong><span>Protect your
    device against cyberattacks</span></strong><span><br>
    Make sure all of your devices are protected by a  </span><a href="https://usa.kaspersky.com/resource-center/preemptive-safety/antivirus-choices" rel="nofollow external" class="bo"><span>rigorous anti-malware and security solution</span></a><span>  — and ensure
    that it’s updated as regularly as possible. <br>
    <br>
    </span></p>
    
    <p><span> </span></p>
    
    </div>
]]>
</Body>
<Summary>Public Wi Fi is famous with its easily availability and free access. Any person with their computer or other devices can access Public Wi -Fi. Public Wi -Fi could be found in convenient places...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80950/guest@my.umbc.edu/f135b803f0cbdcd47450ef62a80ec3fb/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>6</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Mon, 10 Dec 2018 10:48:33 -0500</PostedAt>
<EditAt>Mon, 10 Dec 2018 10:50:36 -0500</EditAt>
</NewsItem>

<NewsItem contentIssues="false" id="80102" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/80102">
<Title>Social Engineering</Title>
<Body>
<![CDATA[
    <div class="html-content"><p> <strong><span>Definition of Social Engineering.</span></strong></p>
    
    <p>In social engineering, a cybercriminal is basically relying
    on social activities (and interactions) of human beings to collect information
    by tricking them. For example, asking people to open a phishing email (with attached
    malware) and thus breaking standard practice of an organization related to the
    best practices for minimizing risks. Social engineering often involves human
    socialization and interaction rather than hacking a network. The criminals are
    basically con artists. Criminals are interested in gaining “confidence” of a
    person so that he/she might share confidential information of a business for
    further exploitation or hacking activities in the future.</p>
    
    <p><strong><span>Types of Social engineering.</span></strong></p>
    
    <p>There are several types of social engineering attacks. Such
    as, baiting; phishing; pretexting; quid-pro-quo; spear phishing; and
    tailgating.</p>
    
    <p>In baiting, criminals leave a malware infected device to be
    opened by an innocent person.</p>
    
    <p>In phishing, criminals make fraudulent communication
    (appearing to be legitimate). Victims are tricked to opening an email with an
    appearance of a legitimate sender. Charity to help poor (but has malware).</p>
    
    <p>In pretexting, criminals are scammers interested in victims
    to disclose confidential information.</p>
    
    <p>In quid pro quo, criminals are offering a gift item to
    attract a victim for obtaining personal data.</p>
    
    <p>In spear phishing, criminals are collecting data from social
    network (Facebook) and customizing this data to gain confidence of a victim in
    order to reveal personal information or trade secrets. </p>
    
    <p>In tailgating, criminals actually follow victims to his
    office or home. Example asking a victim to hold a door open while criminal
    installs a bug (secretly) capable of transmitting data about victim’s
    activities.</p>
    
    <p><strong><span>Solution</span></strong></p>
    
    <p>How to avoid social engineering risks. It is best to educate
    people and remind them constantly about dangers. Constant reminder is a must.
    Otherwise, people forget and tend to overlook cyber risks.<span></span></p>
    
    </div>
]]>
</Body>
<Summary> Definition of Social Engineering.    In social engineering, a cybercriminal is basically relying on social activities (and interactions) of human beings to collect information by tricking them....</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/80102/guest@my.umbc.edu/0683c6ade561e78e5b6c96486b237cb6/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>4</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Tue, 06 Nov 2018 09:33:18 -0500</PostedAt>
</NewsItem>

<NewsItem contentIssues="false" id="79961" important="false" status="posted" url="https://beta.my.umbc.edu/groups/bethekey/posts/79961">
<Title>RISKS OF DIGITAL DEVICES LEFT UNATTENDED.</Title>
<Body>
<![CDATA[
    <div class="html-content">
    
    
    
    
    
    
    
    
    
    <p>The topic is about pros and cons for leaving a digital
    device unattended, such as a cell phone, a laptop or a desktop computer. It
    does not matter whether devices are personally owned or business owned.</p>
    
    <p><br></p>
    
    <p>CONS:</p>
    
    <p><span><span>1.<span>    
    </span></span></span>This situation of leaving a device unattended is
    like leaving a car unlocked. The biggest risk is about the loss of a device
    itself (i.e. stolen). Thieves would be able to sell parts of a device if not an
    entire device. True, stolen devices could be tracked. But, only when a device
    is unassembled. </p>
    
    <p> </p>
    
    <p><span><span>2.<span>    
    </span></span></span>Loss of privacy. Intruders might be able to see
    (and read) confidential matters. Doesn’t matter whether the stored information
    is personal (e.g. family photos) or business (e.g. contracts). Thus, putting a
    business or an employer at a risk when sensitive information is left unguarded.</p>
    
    <p> </p>
    
    <p><span><span>3.<span>    
    </span></span></span>Spies could install malware on an unattended
    device and download stored information remotely at their convenience.
    (Sometime, government spies including manufacturers from China install malware
    devices on laptops sold to a country for monitoring daily activities).<a href="#_ftn1" title="" rel="nofollow external" class="bo"><span><span><span><span>[1]</span></span></span></span></a></p>
    
    <p> </p>
    
    <p><span><span>4.<span>    
    </span></span></span>Waste of electric power or discharging battery
    if left unlocked and running (while a device is also left unattended). If left
    running 24/7 then internal parts of device would wear quickly (because every
    part has a limited life based on number of operating hours).</p>
    
    <p> </p>
    
    <p><span><span>5.<span>    
    </span></span></span>Children may visit unauthorized webpages in case
    a personal laptop or a cell phone is left unattended. Children might be exposed
    to inappropriate materials. Children may be targeted by predators. Children may
    post something on line (and it is difficult to delete almost anything once
    something is posted on line). Children may play for hours and hours and exposed
    to health risk (i.e. weight gain, watching games on a device left unattended).
    Children distracted from studies. </p>
    
    <p> </p>
    
    <p>PROS:</p>
    
    <p> </p>
    
    <p>Almost none. Except, a minor convenience of not turning ON.
    We see that in offices desktops are left running at night. Monitors get burned.
    Parts get worn (limited life). And, security guards are annoyed.</p>
    
    <p> </p>
    
    <div><br>
    
    <hr>
    
    
    
    <div>
    
    <p><a href="#_ftnref1" title="" rel="nofollow external" class="bo"><span><span><span><span>[1]</span></span></span></span></a> <a href="https://www.pcworld.com/article/2453100/malware-hidden-in-chinese-inventory-scanners-targeted-logistics-shipping-firms.html" rel="nofollow external" class="bo">https://www.pcworld.com/article/2453100/malware-hidden-in-chinese-inventory-scanners-targeted-logistics-shipping-firms.html</a></p>
    
    <p> </p>
    
    </div>
    
    </div>
    
    </div>
]]>
</Body>
<Summary>The topic is about pros and cons for leaving a digital device unattended, such as a cell phone, a laptop or a desktop computer. It does not matter whether devices are personally owned or business...</Summary>
<TrackingUrl>https://beta.my.umbc.edu/api/v0/pixel/news/79961/guest@my.umbc.edu/07a6dfce2715b1b756a35225fd13c507/api/pixel</TrackingUrl>
<Tag>security</Tag>
<Group token="bethekey">Be the Key</Group>
<GroupUrl>https://beta.my.umbc.edu/groups/bethekey</GroupUrl>
<AvatarUrl>https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="original">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/original.jpg?1507133129</AvatarUrl>
<AvatarUrl size="xxlarge">https://assets1-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="xlarge">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xlarge.png?1507133129</AvatarUrl>
<AvatarUrl size="large">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/large.png?1507133129</AvatarUrl>
<AvatarUrl size="medium">https://assets3-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/medium.png?1507133129</AvatarUrl>
<AvatarUrl size="small">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/small.png?1507133129</AvatarUrl>
<AvatarUrl size="xsmall">https://assets2-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xsmall.png?1507133129</AvatarUrl>
<AvatarUrl size="xxsmall">https://assets4-beta.my.umbc.edu/system/shared/avatars/groups/000/001/391/44dbce66ff748e103746f42e55a587df/xxsmall.png?1507133129</AvatarUrl>
<Sponsor>Be the Key</Sponsor>
<PawCount>2</PawCount>
<CommentCount>0</CommentCount>
<CommentsAllowed>true</CommentsAllowed>
<PostedAt>Wed, 31 Oct 2018 13:31:28 -0400</PostedAt>
</NewsItem>

</News>
