The Devil Strip - May 2021 Digital Edition

Page 38

Never answer a number that you do not recognize. If it is important, they will leave a voicemail. When they do leave a voicemail, use the internet to verify the phone number, website or other contact information. Do this by entering the company name into a search engine and comparing the information in the communication. Once you have verified the information is legitimate, it is safe to click on a link. If you cannot verify that the communication is legitimate, do not click on the link, return the phone call or respond to the message. This is true for landlines and mobile devices.

Always take a few extra minutes to verify the information.

Always wait until you have time to process a request before responding. This eliminates the impulse to respond quickly.

Always be suspicious. It is better to be a day late in responding than it is to spend months or

38 | The Devil Strip

years fixing something that could have been avoided. Phishing attacks play on your trust, your beliefs, your fear and other emotions to be effective. The only way to counter that is to slow down. There is no quick solution to cybersecurity issues. It is a matter of diligence, patience, common sense and using cybersecurity best practices. I would like to hear your questions and concerns for future articles. You can reach me at jbnicholasphd@ gmail.com. // Dr. John B. Nicholas is a Professor of Computer Information Systems and Co-Founder of the Cybersecurity Degree Track at The University of Akron. Dr. Nicholas has over 30 years of experience in the technology field in both the private sector and in higher education.

May 2021 · Vol 9 · Issue #5

thedevilstrip.com


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.