<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Privacy &amp; Security &#8211; BC Knowledge for Students</title>
	<atom:link href="https://students.brooklyn.edu/article-categories/privacy-security/feed/" rel="self" type="application/rss+xml" />
	<link>https://students.brooklyn.edu</link>
	<description>Search for answers to your questions</description>
	<lastBuildDate>Wed, 15 Apr 2026 19:53:14 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://students.brooklyn.edu/files/2022/03/cropped-favicon-3-32x32.png</url>
	<title>Privacy &amp; Security &#8211; BC Knowledge for Students</title>
	<link>https://students.brooklyn.edu</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Recent CUNY Phishing Examples</title>
		<link>https://students.brooklyn.edu/knowledge-base/recent-cuny-phishing-examples/</link>
		
		<dc:creator><![CDATA[rklein]]></dc:creator>
		<pubDate>Mon, 23 Feb 2026 15:49:26 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=19028</guid>

					<description><![CDATA[The following are recent phishing email examples sent to CUNY students from compromised Microsoft 365 accounts.]]></description>
										<content:encoded><![CDATA[
<p>The following are recent phishing email examples sent to CUNY students from compromised Microsoft 365 accounts.</p>



<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" width="1024" height="497" src="https://students.brooklyn.edu/files/2026/02/image002-1024x497.png" alt="" class="wp-image-19030" srcset="https://students.brooklyn.edu/files/2026/02/image002-1024x497.png 1024w, https://students.brooklyn.edu/files/2026/02/image002-300x146.png 300w, https://students.brooklyn.edu/files/2026/02/image002-768x373.png 768w, https://students.brooklyn.edu/files/2026/02/image002-50x24.png 50w, https://students.brooklyn.edu/files/2026/02/image002-60x29.png 60w, https://students.brooklyn.edu/files/2026/02/image002-100x49.png 100w, https://students.brooklyn.edu/files/2026/02/image002.png 1516w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>



<figure class="wp-block-image size-large"><img decoding="async" width="1024" height="954" src="https://students.brooklyn.edu/files/2026/02/image001-1024x954.png" alt="" class="wp-image-19032" srcset="https://students.brooklyn.edu/files/2026/02/image001-1024x954.png 1024w, https://students.brooklyn.edu/files/2026/02/image001-300x280.png 300w, https://students.brooklyn.edu/files/2026/02/image001-768x716.png 768w, https://students.brooklyn.edu/files/2026/02/image001-50x47.png 50w, https://students.brooklyn.edu/files/2026/02/image001-60x56.png 60w, https://students.brooklyn.edu/files/2026/02/image001-100x93.png 100w, https://students.brooklyn.edu/files/2026/02/image001.png 1469w" sizes="(max-width: 1024px) 100vw, 1024px" /></figure>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>What are some scam employer red-flags?</title>
		<link>https://students.brooklyn.edu/knowledge-base/what-are-some-scam-employer-red-flags/</link>
		
		<dc:creator><![CDATA[ALEX EUCEDA]]></dc:creator>
		<pubDate>Mon, 26 Sep 2022 18:08:45 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=2069</guid>

					<description><![CDATA[Before responding to any email, keep this in mind: The Recruiter&#160;(BIG RED FLAGS) Information They Ask For/Instructions Given&#160; Company/Job Details Here are some real examples of emails that look legitimate but are a scam: You are welcome to &#60;name of real company&#62; Pharmaceuticals telecommute position, attached to this Email entails...]]></description>
										<content:encoded><![CDATA[
<p class="wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-danger">Known scam/spam emails are documented on the college&#8217;s reported email&#8217;s <a href="https://infoblog.brooklyn.edu/spam/">spam page</a>. In addition, you can always send any email in question to <a href="mailto:BC-InfoSec@brooklyn.cuny.edu">BC-InfoSec@brooklyn.cuny.edu</a>.</p>



<p class="wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-info">Students with concerns about <strong>any</strong> job posting or opportunity should notify the Magner Career Center before taking any action. Students can reach us at 718.951.5696, or through email at <a href="mailto:careernews@brooklyn.cuny.edu">careernews@brooklyn.cuny.edu</a>. </p>



<p class="wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-alert">The Magner Career Center has no affiliation with these employers and can make no representation or guarantees concerning the positions listed. While the vast majority of positions are legitimate, we have seen an increase in the number of scam employers who are using job posting sites to scam students. While the center does its best to vet the employer and postings, it is the students&#8217; responsibility to do additional research before they apply or interview for a position, even if the posting is on BC Handshake or any other site you encounter. Scam employers are becoming very sophisticated in evading detection during the vetting process by masquerading as legitimate companies or sending emails that come from a Brooklyn College email.</p>



<h4 class="wp-block-heading"><strong>Before responding to any email, keep this in mind: </strong></h4>



<ul class="wp-block-list">
<li><strong><u>Legitimate employers will not</u></strong>&nbsp;ask for your bank account details or your SSN prior to a job interview, job offer and/or job acceptance.&nbsp; <span style="text-decoration: underline"><strong>They will&nbsp;not&nbsp;ask you to send money or to deposit money.</strong></span> </li>



<li><strong><span style="text-decoration: underline">Beware of Brooklyn College Hacked Email Accounts:</span></strong> If you are receiving an email from a student or staff/faculty you have never interacted with, <strong>NEVER SEND PAYMENT</strong> for any reason. Staff/faculty will use official channels like CUNYFIRST when requesting payments. </li>



<li><strong><u>Prior to a legitimate job acceptance, don’t</u>:&nbsp;</strong>Provide financial information, a copy of your driver’s license, a copy of your SS card or a copy of your Student ID.</li>



<li><span style="text-decoration: underline"><strong>Reddit can be a great tool to begin the job vetting process.</strong> </span>Simply search up the name of the company on Reddit and see if you can find any existing discussions. </li>
</ul>



<h4 class="wp-block-heading"><strong>The Recruiter&nbsp;(BIG RED FLAGS)</strong></h4>



<ul class="wp-block-list">
<li><strong>How They Contacted You/Want You to Contact Them&nbsp;</strong>
<ol class="wp-block-list">
<li>You receive an email that appears to be from a professor, staff member or student you don&#8217;t know. The email may appear to come from an official Brooklyn College email address or a personal email address that includes the person’s name in the &#8220;From&#8221; field. However, when you check the actual sender’s email address, it seems random, unfamiliar, or suspicious (e.g., not an official school domain or with a suspicious username).</li>



<li>You receive a job opportunity in an email from a sender that is not from the Magner Career Center.</li>



<li><strong>The posting forwarded to you says to use your personal email to respond and not your school email or they email you at your school email address but ask you to email them from a personal email to try to avoid the school&#8217;s spam filters.</strong></li>



<li>The employer uses a personal email account to communicate. Make sure addresses are coming from a corporate or business email. </li>



<li>The email came from one address such as a BC email but after you respond they are emailing from a different email address.</li>
</ol>
</li>
</ul>



<ul class="wp-block-list">
<li>You did not apply for the position (this may happen but it is best to call the company to make sure it is a real person).&nbsp;<strong>Tip: be careful what information you post on job search sites. Even legitimate sites can have scam job postings.</strong></li>



<li>Contacts you via LinkedIn, or another social media outlet<strong>&nbsp;(While this can be legitimate, you should always try to call or email the company’s Human Resources department, to find out if they really have such a job opening and, if the name of a recruiter is given, ask if that person really works for them). For entry level jobs they usually won&#8217;t reach out to you.</strong></li>



<li>The organization uses street canvassers.</li>



<li>The employer uses an e-mail address or website that may look legitimate but differs slightly from the real organization&#8217;s e-mail address and/or website (even just one letter off).&nbsp; </li>



<li>Or is pretty different from the URL of the company or emails listed on the site (might even say the company name but does not match the rest). The phone number or address does not match the company.&nbsp;</li>
</ul>



<ul class="wp-block-list">
<li>Difficult to contact or identify the person who posted the position.&nbsp;&nbsp;<strong>Tip: Check on LinkedIn to see if the person is there&nbsp;&nbsp;</strong>but even if you find the person&#8217;s name on LinkedIn the scammer may be just using their name.&nbsp;</li>



<li>The employer makes inappropriate comments or has unprofessional behavior during the interview or after.</li>



<li>The employer asks&nbsp;<a href="https://www.thebalance.com/job-interview-questions-that-are-illegal-1918488">illegal interview questions</a>.</li>



<li><strong>The employer makes a job offer over the phone or via email without an interview.</strong>&nbsp;&nbsp;</li>



<li>The employer requests for an interview during non-business hours.</li>



<li>The employer asks someone to apply on a website separate from the company website</li>
</ul>



<h4 class="wp-block-heading has-text-color" style="color:#e31414"><strong>Information They Ask For/Instructions Given&nbsp;</strong></h4>



<ol class="wp-block-list">
<li><strong>The employer asks for your social security number or other personal information such as a copy of your ID, mailing address, bank information especially <span style="text-decoration: underline">before</span> hiring you or interviewing you.</strong></li>



<li>Asks you to send money or to deposit money.</li>



<li>Employment agencies that charge a fee
<ol class="wp-block-list">
<li>While some legitimate agencies may charge for use of their services, it is encouraged to do extensive research  </li>
</ol>
</li>
</ol>



<h4 class="wp-block-heading"><strong>Company/Job Details</strong></h4>



<ul class="wp-block-list">
<li>The organization has no established website.</li>



<li>There is a generic description of what the company does, and not what the intern/employee will do.</li>



<li>Limited details about the organization are available in the posting or online when you do research.</li>



<li>You might even get something that looks legitimate, has their logo, address etc. but read the document carefully to see if what is written makes sense, has proper spelling and grammar.</li>



<li>An internship is unpaid but does not comply with&nbsp;<a href="https://www.dol.gov/whd/regs/compliance/whdfs71.pdf">DOL&#8217;s Guidelines for Unpaid Internships.</a></li>



<li>The organization posted an internship after mid-semester when it is too late to make arrangements for academic credit.</li>



<li>Be cautious of startup organizations; some can be unorganized and not in compliance with DOL guidelines.</li>



<li>You are set to work in a home office or residence versus a business office setting &#8211; the internship/job can also be virtual where you work from home.</li>



<li>The opportunity sounds too good to be true. An example of this can be the organization offers a high hourly rate or salary.</li>
</ul>



<h4 class="wp-block-heading"><strong>Here are some real examples of emails that look legitimate but are a scam:</strong></h4>



<ul class="wp-block-list">
<li><strong>Sent to a BC staff member:&nbsp;</strong>My name is Alexandra, i am an Alumni of Brooklyn College. I have an uncle Doctor Paul &lt;last name&gt; who is moving to the College &nbsp;area, he needs someone to watch, bath and walk his dogs, he is offering $300 Weekly. if you know a student who might be interested in this position have them email him via&nbsp;&lt;different email address&gt;. to make sure he sees their respond, interested student should message him from their personal email address.</li>



<li><strong>Email from student scammed $100 by sending payment to unverified staff email:<br></strong>Someone sent me an email through the school email that Kendra Lewis was giving away her husbands stuff because she&#8217;s moving overseas and you have to only pay for shipping. I wanted the camera so I emailed her and she said okay send me 100$ for shipping and you will have the camera on Sunday. But, she kept demanding to send her another 50$ for insurance. I told her I can&#8217;t the 100$ was all I had. Now I demanded a refund, but she&#8217;s not answering.</li>



<li><strong>Sent to a BC student from another BC email:&nbsp;</strong><br>I&#8217;m &lt;First name last name&gt; from Indeed. I am in urgent need of a Personal Assistant/Errands person (part-time) Pay is $500/week. Interested? Write to &lt;different email address&gt;&nbsp;from your personal email for more details about this job.</li>



<li><strong>Sent to a BC Student: </strong><br>“Dear Staff and Student, This message is from Campus Job Placement &amp; Student Services.&nbsp;During this time that we are in, working from home would be great. Therefore, The school job regulatory system has&nbsp;offered&nbsp;you a Job Opportunity at the convenience of your home or school,&nbsp; which serves as a gateway to paying all expenses incurred on campus. This opportunity should be done at leisure taking at most 1 hour/day,2-3 times a week and earn $450 Bi-Weekly.. It’s a Flexible Opportunity where you will determine your working time. All the tasks are work from home/on campus, you don&#8217;t need to travel , you don’t need to have a car to get started. You can be in any location and work from your home/ school, To apply: <br>CLICK HERE&nbsp;or email your resume to&nbsp;&#8230;@m.com.”&nbsp;<br>CUNY Career Centre</li>



<li><strong>Sent to a BC student through someone who got their email from Linkedin</strong>:</li>
</ul>



<p>You are welcome to &lt;<em>name of real company</em>&gt; Pharmaceuticals telecommute position, attached to this Email entails the company details and the job briefing of the position.&nbsp; I would like to chat with you for about 40-55 minutes to learn more about your background and what you are looking for in a career. To setup an interview, you are required to follow up by following steps below.</p>



<p>Step 1.Download RingCentral application for your device (<a href="http://glip.com/">glip.com</a>) on your PC,smartphone,IOS/Andriod. &nbsp;</p>



<p>Step 2. Create an account using your existing email to create a username and password.</p>



<p>Step 3. Add me to your contact using my email (<a href="mailto:barbara@careers-pfizer.com">barbara@careers-<em>name of real company</em>.com</a>) after you might have created your account.</p>



<p>Step 4. Send me your Interview Code: “PF501180” once you are set up.</p>



<p>Let me know what time works best for you to interview. Note: This is a work from home position and you can work from anywhere within the states. Full training will be offered to you. You are also welcome to apply for part-time, keep your other jobs and still enjoy full benefits.</p>



<p>Signed with name of actual employee from company (found on Linkedin)&nbsp;</p>



<h4 class="wp-block-heading"><strong><u>Types of Scams:</u></strong></h4>



<p>The frequency, complexity, and variety of employment scams are on the rise. Below you will find examples of four common employment scams:</p>



<ul class="wp-block-list">
<li><strong><u>Payment Forward Scams</u></strong>: After you apply for a “position” or reply to an e-mail, the bogus “employer” replies with instructions to complete a task. Typically, the details are that you receive a check in the mail with instructions to deposit the check into your account, and send a percentage, via wire transfer, to another person. The employer promises that you will keep a percentage. This scam is sometimes referred to as a “money mule,” posted under the titles of “financial manager”, “payment processor”, or “transaction specialist”. Do not accept the check. The check will then bounce and you, the job seeker, will lose whatever money you sent to the “employer”.&nbsp;They will ask you to deposit a check, transfer some of the money to someone else or to purchase other items.&nbsp;But in reality, the money received is stolen, often the result of fraud on accounts, and is then laundered to overseas bank accounts.&nbsp;</li>



<li><strong><u>Application Fee or Training Scams</u></strong>: These scams charge you an “application fee” or ask you to pay for “mandatory training” in exchange for “guaranteed” employment. The cruise line, postal service industry and security officers have been used as pawns in this scam.</li>



<li><strong><u>Phishing Scams</u></strong>: Unsolicited emails or texts from “employers” declaring that they are responding to your posted resume are typically examples of phishing scams. They will often state that your skills match the position that needs to be filled, but they need more information from you. The information they are seeking is often personal information, which can be used to steal your identity.</li>



<li><strong><u>Mystery/Secret Shopper Scams</u></strong>: There are legitimate mystery shopping companies that hire college students and others to provide feedback to retailers and restaurants. Unfortunately, many mystery shopper postings are scams. This scam also occurs through unsolicited emails or via online job posting boards. Typically the “company” asks you to pay a fee to become an “employee” or “mystery shop”&nbsp;If a job sounds too good to be true, it almost certainly is…don’t pursue it without diligent research.</li>



<li><strong><u>Network Marketing</u>: </strong>Individuals, claiming to be Brooklyn College alumni, have been contacting students and enticing them with promises of earning income and retiring early. They employ persuasive phrases such as &#8220;network marketing,&#8221; &#8220;personal mentoring,&#8221; and &#8220;investment opportunities.&#8221; They may also offer you a book to read and discuss during an in-person meeting. It is important to recognize these red flags, as these individuals may eventually request that you invest money with the promise of high returns. If you receive messages of this nature, <span style="text-decoration: underline">it is crucial to report them immediately through LinkedIn</span> <strong>and refrain from responding</strong>.</li>



<li><strong><span style="text-decoration: underline">Personal Assistant Scam</span></strong>: Individuals claiming to be successful international employers have been reaching out to students via WhatsApp. Be wary of any job requesting you to call or text to apply; this is not a common application method for legitimate employers. </li>
</ul>



<h4 class="wp-block-heading"><strong><u>What to do if you are caught by a Scam</u></strong><strong>:</strong></h4>



<ul class="wp-block-list">
<li>Assess how much of your personal information is potentially out there.</li>



<li>If they sent you a check, destroy it and let them know you are no longer interested in the position.</li>



<li>Get in touch with your bank or credit-card company and dispute any fraudulent activity immediately.</li>



<li>If you received the scam through your BC email or another BC source notify the Magner Career Center so we can alert other students.</li>



<li>Review the&nbsp;<a href="https://www.consumer.ftc.gov/articles/what-do-if-you-were-scammed">FTC&#8217;s article on what to do if you were scammed</a>&nbsp;</li>
</ul>



<h4 class="wp-block-heading"><strong>What to do if you experience Discrimination/Sexual Misconduct on an Interview?</strong></h4>



<ul class="wp-block-list">
<li>Review&nbsp;<a href="https://www.brooklyn.edu/policies/nondiscrimination/">CUNY&#8217;s Policy on Equal Opportunity and Non-Discrimination.</a></li>



<li>Review Brooklyn College&#8217;s&nbsp;<a href="https://www1.cuny.edu/sites/title-ix/campus/brooklyn-college/">Sexual Misconduct Information and Resources</a>&nbsp;available to you.</li>



<li>Report it to the Magner Career Center <strong>immediately</strong>.</li>
</ul>



<h4 class="wp-block-heading"><strong>For further information on recognizing and protecting yourself from job posting scams view the following links:</strong></h4>



<ul class="wp-block-list">
<li><a href="https://www.bbb.org/">Better Business Bureau</a></li>



<li><a href="http://www.consumer.ftc.gov/articles/0243-job-scams">Federal Trade Commission, Consumer Information</a></li>



<li><a href="https://consumer.ftc.gov/consumer-alerts/2024/04/college-students-are-targeted-jobs-scams-too-0">Federal Trade Commission, College Student Scam Information </a></li>



<li><a href="https://www.hoax-slayer.com/">Hoax Slayer</a></li>



<li><a href="https://www.labor.ny.gov/careerservices/scamwarn.shtm">Labor NY</a></li>



<li><a href="https://www.wsj.com/lifestyle/careers/new-job-scams-targeting-young-professionals-are-flourishing-70e1aba1?mod=hp_featst_pos5">Recognizing Scam Employer Techniques (Wall Street Journal)</a></li>



<li><a href="https://dhr.ny.gov/new-workplace-discrimination-and-harassment-protections">Protections for INTERNS in the Workplace</a></li>



<li><a href="https://www.themuse.com/advice/spot-avoid-job-scams?sc_src=email_975092&amp;sc_lid=66653450&amp;sc_uid=NjBLAkeEsM&amp;sc_llid=218026&amp;sc_eh=7b14600893a937f31&amp;utm_source=emarsys&amp;utm_medium=email&amp;utm_campaign=daily_20210301_90Day_975092&amp;utm_content=Daily+Newsletter&amp;utm_term=_&amp;uid=708812331">The Muse &#8211; Job Scams Are on the Rise &#8211; Here&#8217;s How to Spot them and Steer Clear</a></li>



<li><a href="https://www.thebalancemoney.com/business-is-an-mlm-scam-1794756">The Balance Top Job Scam Warning Signs</a></li>



<li><a href="https://www.naceweb.org/career-development/organizational-structure/fraudulent-employers-tips-for-career-centers-and-students/">NACE Fraudulent Employers</a></li>



<li><a href="https://www.cnbc.com/2022/09/18/22-year-old-goes-viral-for-sharing-job-scam-nightmare-and-red-flags.html">22 Year Old Shares Nightmare of Getting Scammed by Fake Job</a></li>



<li><a href="https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/spoofing-and-phishing#:~:text=In%20a%20phishing%20scam%2C%20you,one%20you've%20used%20before">Spoofing and Phishing — FBI</a></li>
</ul>



<p class="wp-block-ht-blocks-messages wp-block-hb-message wp-block-hb-message--withicon is-style-info">Although the vast majority of internships and job postings are legitimate, it is very important for students to know the warning signs to watch for. Scams can appear on legitimate sites such as BC Handshake, indeed.com, LinkedIn etc. Just because it is on the site, does not mean the posting/employer itself is legitimate. Some postings may be using the information of a real company but the contact information is directing you to a scammer or the scam may even come from the BC email of another student or staff member, whose account was hacked.&nbsp; Students should notify the Career Center if they have any concerns by calling (<strong>718.951.5696</strong>) or emailing&nbsp;<a href="https://mail.brooklyn.cuny.edu/owa/redir.aspx?C=63zt9SIo-wB9Le8fLg2rXigSaRNLNBujYpPZ7wJzvKFRivgYTfLaCA..&amp;URL=mailto%3acareernews%40brooklyn.cuny.edu" target="_blank" rel="noreferrer noopener"><strong>careernews@brooklyn.cuny.edu</strong></a>. Being notified about negative internship/job experiences allows us to prevent other students from applying in the future.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How do I report a suspicious email?</title>
		<link>https://students.brooklyn.edu/knowledge-base/how-do-i-report-a-suspicious-email/</link>
		
		<dc:creator><![CDATA[rklein]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 21:14:31 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=1597</guid>

					<description><![CDATA[If you aren&#8217;t sure if an email is legitimate or looks suspicious, forward the email tobc-infosec@brooklyn.cuny.edu. If you have questions, contact the IT Helpdesk. Review the email safety tips and phishing examples.]]></description>
										<content:encoded><![CDATA[
<p>If you aren&#8217;t sure if an email is legitimate or looks suspicious, forward the email to<br><strong>bc-infosec@brooklyn.cuny.edu</strong>. If you have questions, contact the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT Helpdesk</a>.</p>



<p>Review the <a href="https://students.brooklyn.edu/knowledge-base/e-mail-safety/" data-type="ht_kb" data-id="724">email safety tips</a> and <a href="https://students.brooklyn.edu/knowledge-base/how-can-i-spot-a-phishing-email/" data-type="ht_kb" data-id="1563">phishing examples</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How can I spot a phishing email?</title>
		<link>https://students.brooklyn.edu/knowledge-base/how-can-i-spot-a-phishing-email/</link>
		
		<dc:creator><![CDATA[rklein]]></dc:creator>
		<pubDate>Tue, 15 Mar 2022 20:43:13 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=1563</guid>

					<description><![CDATA[Phishing e-mails try to disguise themselves by attempting to imitate a company you know or trust: a bank, a credit card company, a social networking site, an online payment website or app, or an online store. Phishing messages often tell a story to trick you into clicking a link or...]]></description>
										<content:encoded><![CDATA[
<p>Phishing e-mails try to disguise themselves by attempting to imitate a company you know or trust: a bank, a credit card company, a social networking site, an online payment website or app, or an online store. Phishing messages often tell a story to trick you into clicking a link or opening an attachment.</p>



<ul class="wp-block-list">
<li><strong>Do not respond</strong> to these e-mails, and never provide any personal information by e-mail. </li>



<li><strong>Do not click</strong> any links and do not open any attachments you weren’t expecting to receive. </li>



<li><strong>Do not forward</strong> these e-mails to your friends.</li>
</ul>



<p>View <a href="https://infoblog.brooklyn.edu/category/spam/">examples of real spam/phishing emails</a> sent to Brooklyn College.</p>



<h2 class="wp-block-heading">Red Flags</h2>



<p>Here are some examples from actual phishing email scams and red flags to look for:</p>



<figure class="wp-block-image size-full"><img decoding="async" width="520" height="520" src="https://students.brooklyn.edu/files/2022/03/image-3.png" alt="" class="wp-image-1566" srcset="https://students.brooklyn.edu/files/2022/03/image-3.png 520w, https://students.brooklyn.edu/files/2022/03/image-3-300x300.png 300w, https://students.brooklyn.edu/files/2022/03/image-3-150x150.png 150w, https://students.brooklyn.edu/files/2022/03/image-3-50x50.png 50w, https://students.brooklyn.edu/files/2022/03/image-3-60x60.png 60w, https://students.brooklyn.edu/files/2022/03/image-3-100x100.png 100w" sizes="(max-width: 520px) 100vw, 520px" /></figure>



<p></p>



<ul class="wp-block-list">
<li>Mouse over the VERIFY link, will reveal non-Brooklyn College/CUNY address.</li>



<li>Official Brooklyn College/CUNY email correspondence will always have official Brooklyn College contact information listed.</li>



<li>NO official correspondence originates from student email account (@bcmail.cuny.edu).</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="520" height="321" src="https://students.brooklyn.edu/files/2022/03/image-4.png" alt="" class="wp-image-1568" srcset="https://students.brooklyn.edu/files/2022/03/image-4.png 520w, https://students.brooklyn.edu/files/2022/03/image-4-300x185.png 300w, https://students.brooklyn.edu/files/2022/03/image-4-50x31.png 50w, https://students.brooklyn.edu/files/2022/03/image-4-60x37.png 60w, https://students.brooklyn.edu/files/2022/03/image-4-100x62.png 100w" sizes="auto, (max-width: 520px) 100vw, 520px" /></figure>



<ul class="wp-block-list">
<li>As our system clearly indicates, this email came from outside of Brooklyn College it <strong>DID NOT</strong> come from within the college.</li>



<li>Official Brooklyn College email correspondence will always have official Brooklyn College contact information listed.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="511" height="286" src="https://students.brooklyn.edu/files/2022/03/image-5.png" alt="" class="wp-image-1570" srcset="https://students.brooklyn.edu/files/2022/03/image-5.png 511w, https://students.brooklyn.edu/files/2022/03/image-5-300x168.png 300w, https://students.brooklyn.edu/files/2022/03/image-5-50x28.png 50w, https://students.brooklyn.edu/files/2022/03/image-5-60x34.png 60w, https://students.brooklyn.edu/files/2022/03/image-5-100x56.png 100w" sizes="auto, (max-width: 511px) 100vw, 511px" /></figure>



<ul class="wp-block-list">
<li>As our system clearly indicates, this email came from outside of Brooklyn College it <strong>DID NOT</strong> come from within the college.</li>



<li>Legitimate signature is missing.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="511" height="362" src="https://students.brooklyn.edu/files/2022/03/image-6.png" alt="" class="wp-image-1571" srcset="https://students.brooklyn.edu/files/2022/03/image-6.png 511w, https://students.brooklyn.edu/files/2022/03/image-6-300x213.png 300w, https://students.brooklyn.edu/files/2022/03/image-6-50x35.png 50w, https://students.brooklyn.edu/files/2022/03/image-6-60x43.png 60w, https://students.brooklyn.edu/files/2022/03/image-6-100x71.png 100w" sizes="auto, (max-width: 511px) 100vw, 511px" /></figure>



<ul class="wp-block-list">
<li>As our system clearly indicates, this email came from outside of Brooklyn College it <strong>DID NOT</strong> come from within the college.</li>



<li>Mouse over the <strong>GATEWAY</strong> link, will reveal non-Brooklyn College address.</li>



<li>Official Brooklyn College email correspondence will always have official Brooklyn College contact information listed.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="514" height="313" src="https://students.brooklyn.edu/files/2022/03/image-7.png" alt="" class="wp-image-1573" srcset="https://students.brooklyn.edu/files/2022/03/image-7.png 514w, https://students.brooklyn.edu/files/2022/03/image-7-300x183.png 300w, https://students.brooklyn.edu/files/2022/03/image-7-50x30.png 50w, https://students.brooklyn.edu/files/2022/03/image-7-60x37.png 60w, https://students.brooklyn.edu/files/2022/03/image-7-100x61.png 100w" sizes="auto, (max-width: 514px) 100vw, 514px" /></figure>



<ul class="wp-block-list">
<li>As our system clearly indicates, this email came from outside of Brooklyn College it <strong>DID NOT</strong> come from within the college.</li>



<li>Despite the fact this email came from Brooklyn College, mouse over the link, will reveal non-Brooklyn College address.</li>



<li>Official Brooklyn College email correspondence will always have official Brooklyn College contact information listed.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="515" height="388" src="https://students.brooklyn.edu/files/2022/03/image-8.png" alt="" class="wp-image-1574" srcset="https://students.brooklyn.edu/files/2022/03/image-8.png 515w, https://students.brooklyn.edu/files/2022/03/image-8-300x226.png 300w, https://students.brooklyn.edu/files/2022/03/image-8-50x38.png 50w, https://students.brooklyn.edu/files/2022/03/image-8-60x45.png 60w, https://students.brooklyn.edu/files/2022/03/image-8-100x75.png 100w" sizes="auto, (max-width: 515px) 100vw, 515px" /></figure>



<ul class="wp-block-list">
<li>As our system clearly indicates, this email came from outside of Brooklyn College it <strong>DID NOT</strong> come from within the college.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="513" height="505" src="https://students.brooklyn.edu/files/2022/03/image-9.png" alt="" class="wp-image-1579" srcset="https://students.brooklyn.edu/files/2022/03/image-9.png 513w, https://students.brooklyn.edu/files/2022/03/image-9-300x295.png 300w, https://students.brooklyn.edu/files/2022/03/image-9-50x50.png 50w, https://students.brooklyn.edu/files/2022/03/image-9-60x60.png 60w, https://students.brooklyn.edu/files/2022/03/image-9-100x98.png 100w" sizes="auto, (max-width: 513px) 100vw, 513px" /></figure>



<ul class="wp-block-list">
<li>Despite the email showing sender as someone from Brooklyn college (irs.service@brookyn.cuny.edu) our system clearly indicates it <strong>DID NOT</strong> come from within the college.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="517" height="439" src="https://students.brooklyn.edu/files/2022/03/image-10.png" alt="" class="wp-image-1580" srcset="https://students.brooklyn.edu/files/2022/03/image-10.png 517w, https://students.brooklyn.edu/files/2022/03/image-10-300x255.png 300w, https://students.brooklyn.edu/files/2022/03/image-10-50x42.png 50w, https://students.brooklyn.edu/files/2022/03/image-10-60x51.png 60w, https://students.brooklyn.edu/files/2022/03/image-10-100x85.png 100w" sizes="auto, (max-width: 517px) 100vw, 517px" /></figure>



<ul class="wp-block-list">
<li>Our system clearly indicates it <strong>DID NOT</strong> come from within the college.<br>Scammers will often send the email from a random email account and change the Display Name of the email address to either your boss, supervisor, or director.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="515" height="263" src="https://students.brooklyn.edu/files/2022/03/image-11.png" alt="" class="wp-image-1581" srcset="https://students.brooklyn.edu/files/2022/03/image-11.png 515w, https://students.brooklyn.edu/files/2022/03/image-11-300x153.png 300w, https://students.brooklyn.edu/files/2022/03/image-11-50x26.png 50w, https://students.brooklyn.edu/files/2022/03/image-11-60x31.png 60w, https://students.brooklyn.edu/files/2022/03/image-11-100x51.png 100w" sizes="auto, (max-width: 515px) 100vw, 515px" /></figure>



<ul class="wp-block-list">
<li>Despite the email showing sender as someone from Brooklyn college (<a href="mailto:helpdesk@brookyn.cuny.edu">helpdesk@brookyn.cuny.edu</a>) our system clearly indicates it&nbsp;<strong>DID NOT</strong>&nbsp;come from within the college.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="515" height="276" src="https://students.brooklyn.edu/files/2022/03/image-12.png" alt="" class="wp-image-1582" srcset="https://students.brooklyn.edu/files/2022/03/image-12.png 515w, https://students.brooklyn.edu/files/2022/03/image-12-300x161.png 300w, https://students.brooklyn.edu/files/2022/03/image-12-50x27.png 50w, https://students.brooklyn.edu/files/2022/03/image-12-60x32.png 60w, https://students.brooklyn.edu/files/2022/03/image-12-100x54.png 100w" sizes="auto, (max-width: 515px) 100vw, 515px" /></figure>



<ul class="wp-block-list">
<li>Our system clearly indicates it <strong>DID NOT</strong> come from within the college.</li>



<li>The name of the sender does not match sender&#8217;s email address.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="522" height="350" src="https://students.brooklyn.edu/files/2022/03/image-14.png" alt="" class="wp-image-1584" srcset="https://students.brooklyn.edu/files/2022/03/image-14.png 522w, https://students.brooklyn.edu/files/2022/03/image-14-300x201.png 300w, https://students.brooklyn.edu/files/2022/03/image-14-50x34.png 50w, https://students.brooklyn.edu/files/2022/03/image-14-60x40.png 60w, https://students.brooklyn.edu/files/2022/03/image-14-100x67.png 100w" sizes="auto, (max-width: 522px) 100vw, 522px" /></figure>



<ul class="wp-block-list">
<li>The&nbsp;<strong>FROM</strong>&nbsp;field states this email came from kbcc.cuny.edu (Kingsborough Community College) BUT the footer says it came from Brooklyn College ITS Help Desk.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="528" height="311" src="https://students.brooklyn.edu/files/2022/03/image-15.png" alt="" class="wp-image-1585" srcset="https://students.brooklyn.edu/files/2022/03/image-15.png 528w, https://students.brooklyn.edu/files/2022/03/image-15-300x177.png 300w, https://students.brooklyn.edu/files/2022/03/image-15-50x29.png 50w, https://students.brooklyn.edu/files/2022/03/image-15-60x35.png 60w, https://students.brooklyn.edu/files/2022/03/image-15-100x59.png 100w" sizes="auto, (max-width: 528px) 100vw, 528px" /></figure>



<ul class="wp-block-list">
<li>The domain of the sender does not match.</li>



<li>The spelling of NYS is wrong (there shouldn&#8217;t be a lowercase s in NYs). Possibly the easiest way to recognize any fraudulent email is bad grammar.</li>



<li>Unsolicited emails that contain attachments reek of hackers. Typically, authentic institutions don’t randomly send you emails with attachments, but instead direct you to download documents or files on their own website.</li>
</ul>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="523" height="526" src="https://students.brooklyn.edu/files/2022/03/image-16.png" alt="" class="wp-image-1586" srcset="https://students.brooklyn.edu/files/2022/03/image-16.png 523w, https://students.brooklyn.edu/files/2022/03/image-16-298x300.png 298w, https://students.brooklyn.edu/files/2022/03/image-16-150x150.png 150w, https://students.brooklyn.edu/files/2022/03/image-16-50x50.png 50w, https://students.brooklyn.edu/files/2022/03/image-16-60x60.png 60w, https://students.brooklyn.edu/files/2022/03/image-16-100x100.png 100w" sizes="auto, (max-width: 523px) 100vw, 523px" /></figure>



<ol class="wp-block-list">
<li>Our email security system that filters all inbound and outbound email traffic flagged this email as suspicious by inserting <strong>[Suspect] </strong>in the Subject line of this email.</li>



<li>Despite the email showing sender as someone from Brooklyn college (securities@brookyn.cuny.edu) our system clearly indicates it <strong>DID NOT</strong> come from within the college.</li>



<li>Mouse over the FIX ERROR button, will reveal non Brooklyn college address.</li>
</ol>



<hr class="wp-block-separator has-css-opacity is-style-wide" />



<figure class="wp-block-image size-full"><img loading="lazy" decoding="async" width="520" height="182" src="https://students.brooklyn.edu/files/2022/03/image-17.png" alt="" class="wp-image-1587" srcset="https://students.brooklyn.edu/files/2022/03/image-17.png 520w, https://students.brooklyn.edu/files/2022/03/image-17-300x105.png 300w, https://students.brooklyn.edu/files/2022/03/image-17-50x18.png 50w, https://students.brooklyn.edu/files/2022/03/image-17-60x21.png 60w, https://students.brooklyn.edu/files/2022/03/image-17-100x35.png 100w" sizes="auto, (max-width: 520px) 100vw, 520px" /></figure>



<p>Despite the email showing the sender as someone from Brooklyn college (webmaster@brookyn.cuny.edu) our system clearly indicates it <strong>DID NOT</strong> come from within the college.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CUNY Cybersecurity Awareness Training</title>
		<link>https://students.brooklyn.edu/knowledge-base/cuny-cybersecurity-awareness-training/</link>
		
		<dc:creator><![CDATA[rklein]]></dc:creator>
		<pubDate>Mon, 28 Feb 2022 15:14:15 +0000</pubDate>
				<guid isPermaLink="false">https://students.brooklyn.edu/?post_type=ht_kb&#038;p=1321</guid>

					<description><![CDATA[CUNY students can complete an interactive 25-minute Cybersecurity Awareness Training through Brightspace. You can access the training under the &#8220;Compliance&#8221; or tab. The training covers phishing, password protection, and data safety to protect personal and university information. More CUNY Cybersecurity awareness resources.]]></description>
										<content:encoded><![CDATA[
<p>CUNY students can complete an interactive 25-minute Cybersecurity Awareness Training through <a href="https://students.brooklyn.edu/knowledge-base/brightspace/" data-type="ht_kb" data-id="13868">Brightspace</a>. You can access the training under the &#8220;Compliance&#8221; or tab. </p>



<p>The training covers phishing, password protection, and data safety to protect personal and university information.</p>



<p>More CUNY <a href="https://www.cuny.edu/about/administration/offices/cis/information-security/security-awareness/">Cybersecurity awareness resources</a>.</p>



<div class="wp-block-buttons is-layout-flex wp-block-buttons-is-layout-flex">
<div class="wp-block-button"><a class="wp-block-button__link wp-element-button" href="https://brightspace.cuny.edu/">Open Brightspace</a></div>
</div>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Protecting Yourself Online</title>
		<link>https://students.brooklyn.edu/knowledge-base/protecting-yourself-online/</link>
		
		<dc:creator><![CDATA[web]]></dc:creator>
		<pubDate>Tue, 02 Nov 2021 18:05:45 +0000</pubDate>
				<guid isPermaLink="false">https://students-knowall.blog.brooklyn.edu/?post_type=ht_kb&#038;p=728</guid>

					<description><![CDATA[There are many ways to protect yourself while online. Here are some suggestions to help you stay safe online: We encourage you to complete CUNY&#8217;s short cybersecurity awareness training. Need Help? Contact the IT Helpdesk]]></description>
										<content:encoded><![CDATA[
<p>There are many ways to protect yourself while online. Here are some suggestions to help you stay safe online:</p>



<ul class="wp-block-list">
<li><strong>Install and Maintain Antivirus Software.</strong>&nbsp;Antivirus software recognizes malware and protects your computer against it. Always visit vendor sites directly rather than clicking on advertisements or e-mail links. Because attackers are continually creating new viruses and other forms of malicious code, it is important to keep your antivirus software up to date.</li>



<li><strong>Use Caution With Links and Attachments.</strong>&nbsp;Take appropriate precautions when using e-mail and web browsers to reduce the risk of an infection. Be wary of unsolicited e-mail attachments, and use caution when clicking on e-mail links, even if they seem to come from people you know. If an email looks or sounds suspicious, ask the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT helpdesk</a> before you click. <a href="https://www.fbi.gov/how-we-can-help-you/safety-resources/scams-and-safety/common-scams-and-crimes/spoofing-and-phishing">Learn more about spoofing and phishing</a>. </li>



<li><strong>Block Pop-Up Advertisements.</strong>&nbsp;Pop-up blockers disable windows that could potentially contain malicious code. Most browsers have a free feature that can be enabled to block pop-up advertisements.</li>



<li><strong>Use an Account With Limited Permissions.</strong>&nbsp;When navigating the Web, it&#8217;s a good security practice to use an account with limited permissions. If you do become infected, restricted permissions keep the malicious code from spreading and escalating to an administrative account.</li>



<li><strong>Disable External Media Autorun and Autoplay Eatures.</strong>&nbsp;Disabling AutoRun and AutoPlay features prevents external media infected with malicious code from automatically running on your computer.</li>



<li><strong>Create and Use Strong Passwords</strong>. Make your passwords as difficult as possible to prevent attackers from guessing them.</li>



<li><strong>Keep Software Updated.</strong>&nbsp;Install software patches on your computer so attackers do not take advantage of known vulnerabilities. Consider enabling automatic updates, when available.</li>



<li><strong>Back Up Your Data.</strong>&nbsp;Regularly back up your documents, photos, and important e-mail messages to the cloud or to an external hard drive. (Make sure your hard drive is disconnected from your computer after backup is done). In the event of an infection, your information will not be lost. Keep&nbsp;in mind data containing New York State and other private information (Social Security number, state-issued driver&#8217;s license or non-driver identification card number, financial account number, credit or debit card number), in combination with any required security code, access code, or password that would permit access to an individual&#8217;s financial account, is also classified as Confidential Data regardless of context. Confidential data is not allowed to be processed, created, collected, stored, oor archived in the cloud unless approved by the university&#8217;s chief information security officer.</li>



<li><strong>Install or Enable a Firewall.</strong>&nbsp;Firewalls can prevent some types of infection by blocking malicious traffic before it enters your computer. If the operating system you are using includes one, enable it.</li>



<li><strong>Monitor Accounts.</strong>&nbsp;Look for any unauthorized use of, or unusual activity on, your accounts—especially banking accounts. If you identify unauthorized or unusual activity, contact your account provider immediately.</li>



<li><strong>Avoid Using Public Wi-Fi.</strong>&nbsp;Unsecured public Wi-Fi may allow an attacker to intercept your device&#8217;s network traffic and gain access to your personal information.</li>



<li><strong>Use Dedicated Applications for Banking, Making Payments, Etc.</strong></li>
</ul>



<p>We encourage you to complete <a href="https://students.brooklyn.edu/knowledge-base/cuny-cybersecurity-awareness-training/" data-type="ht_kb" data-id="1321">CUNY&#8217;s short cybersecurity awareness training</a>.</p>



<h3 class="wp-block-heading">Need Help?</h3>



<p><a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">Contact the IT Helpdesk</a></p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>E-Mail Safety</title>
		<link>https://students.brooklyn.edu/knowledge-base/e-mail-safety/</link>
		
		<dc:creator><![CDATA[web]]></dc:creator>
		<pubDate>Tue, 02 Nov 2021 18:03:52 +0000</pubDate>
				<guid isPermaLink="false">https://students-knowall.blog.brooklyn.edu/?post_type=ht_kb&#038;p=724</guid>

					<description><![CDATA[Just because an e-mail message looks like it came from someone you know does not mean that it did. Many e-mail messages have spoofed senders, making it look like the message came from someone else. To minimize your exposure to the damage that might come from malicious e-mail, take a...]]></description>
										<content:encoded><![CDATA[
<p>Just because an e-mail message looks like it came from someone you know does not mean that it did. Many e-mail messages have spoofed senders, making it look like the message came from someone else.</p>



<p>To minimize your exposure to the damage that might come from malicious e-mail, take a few extra precautionary steps and investigate every incoming e-mail.</p>



<h3 class="wp-block-heading">Be Aware</h3>



<p>Phishing e-mails and text messages may look like they’re from a company you know or trust: a bank, a credit card company, a social networking site, an online payment website or app, or an online store. Phishing e-mails and text messages often tell a story to trick you into clicking on a link or opening an attachment. These days it is hard to avoid getting phishing e-mails.&nbsp;<strong>However, you can avoid becoming a victim!</strong></p>



<blockquote class="wp-block-quote is-layout-flow wp-block-quote-is-layout-flow">
<p>Do not respond to these e-mails, and never provide any personal information by e-mail. Do not click any links and do not open any attachments you weren’t expecting to receive. Do not forward these e-mails to your friends.</p>
</blockquote>



<p>Just because an e-mail message looks like it came from someone you know does not mean that it did. Many e-mail messages have spoofed senders, making it look like the message came from someone else.</p>



<p>To minimize your exposure to the damage that might come from malicious e-mail, take a few extra precautionary steps and investigate every incoming e-mail.</p>



<p> <a href="https://students.brooklyn.edu/knowledge-base/how-can-i-spot-a-phishing-email/" data-type="ht_kb" data-id="1563">Learn more about Phishing emails</a>.</p>



<h3 class="wp-block-heading">For iPhone and iPad Users</h3>



<p>Tap on the e-mail to display the message, then tap on Details, and, finally, tap on the sender&#8217;s displayed name. Page displaying options for this sender will show as well as the sender&#8217;s e-mail address. To see where the links provided in the e-mail lead, tap and hold on any link until preview window appears.</p>



<h3 class="wp-block-heading">For Android Users</h3>



<p>Tap on the e-mail to display the message, then press the displayed name to reveal sender&#8217;s e-mail address. Regardless if the e-mail sender is legitimate or not, press the link to &#8220;Copy Address,&#8221; which will reveal the real URL.</p>



<h3 class="wp-block-heading">For Mac Users</h3>



<p>Hover the mouse on top of the sender&#8217;s e-mail to display options. Click on open outlook contact, which should look like an image of an ID card located on the right-hand side of the prompt. This should display the sender&#8217;s entire e-mail as well as other information such as organization and details. To see where the links provided in the e-mail go, hover you mouse over a link; this will reveal the real URL.</p>



<h3 class="wp-block-heading">For Windows Users</h3>



<p>Tap on the e-mail to display the message, then right click on the displayed name to open sender&#8217;s contact card. To see where the links provided in the e-mail go, hover mouse over to reveal the address.</p>



<p>Please remember, do not just click on any links provided in an e-mail. Mishandling fake e-mail could cost you thousands!</p>



<p>Also review the article on <a href="https://students.brooklyn.edu/knowledge-base/what-are-some-scam-employer-red-flags/" data-type="ht_kb" data-id="2069">employer job scams</a>.</p>



<h3 class="wp-block-heading">Need Help?</h3>



<p>If you receive an e-mail that worries you, report it to the <a href="https://students.brooklyn.edu/knowledge-base/about-the-it-helpdesk/" data-type="ht_kb" data-id="1021">IT Helpdesk</a>.</p>



<h3 class="wp-block-heading">I responded to phishing email, what should I do?</h3>



<p>If you sent money via Zelle to a phishing email, you should take the following steps immediately:</p>



<ol class="wp-block-list">
<li><strong>Contact Your Bank</strong> – Reach out to your bank or Zelle provider to report the fraudulent transaction and see if a reversal is possible.</li>



<li><strong>Report the Fraud to Zelle</strong> – Although Zelle transactions are typically irreversible, reporting the issue may help in certain cases.</li>



<li><strong>For an actual loss report</strong> to FBI at <strong>IC3.GOV</strong></li>



<li><strong>File a Fraud Report</strong> – Report the scam to the <strong>Federal Trade Commission (FTC) at reportfraud.ftc.gov</strong> and to <strong>your local law enforcement</strong> if needed.</li>



<li><strong>Monitor Your Accounts</strong> – Keep an eye on bank statements for any unauthorized transactions.</li>



<li><strong>Change Login Credentials</strong> – If you shared sensitive information, you should update passwords and enable two-factor authentication on their accounts.</li>



<li><strong>Report </strong>this incident to BC Campus Security<br>Telephone: 718.951.5511<br>E-mail:&nbsp;<a href="mailto:security@brooklyn.cuny.edu">security@brooklyn.cuny.edu</a></li>
</ol>



<ol start="1" class="wp-block-list">
<li></li>
</ol>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>CUNY Policy on Acceptable Use of Digital Assets and Resources</title>
		<link>https://students.brooklyn.edu/knowledge-base/cuny-computer-use-policy/</link>
					<comments>https://students.brooklyn.edu/knowledge-base/cuny-computer-use-policy/#respond</comments>
		
		<dc:creator><![CDATA[web]]></dc:creator>
		<pubDate>Tue, 17 Aug 2021 19:59:19 +0000</pubDate>
				<guid isPermaLink="false">https://knowall.blog.brooklyn.edu/?post_type=ht_kb&#038;p=218</guid>

					<description><![CDATA[View the complete CUNY Policy on Acceptable Use of Digital Assets and Resources .]]></description>
										<content:encoded><![CDATA[
<p>View the complete <a href="https://www.cuny.edu/wp-content/uploads/sites/4/page-assets/about/administration/offices/legal-affairs/policies-resources/Computer-Use-1.pdf">CUNY Policy on Acceptable Use of Digital Assets and Resources</a> .</p>
]]></content:encoded>
					
					<wfw:commentRss>https://students.brooklyn.edu/knowledge-base/cuny-computer-use-policy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>Brooklyn College — Privacy and FERPA Statements</title>
		<link>https://students.brooklyn.edu/knowledge-base/brooklyn-college-privacy-and-ferpa-statements/</link>
					<comments>https://students.brooklyn.edu/knowledge-base/brooklyn-college-privacy-and-ferpa-statements/#respond</comments>
		
		<dc:creator><![CDATA[web]]></dc:creator>
		<pubDate>Mon, 16 Aug 2021 20:57:30 +0000</pubDate>
				<guid isPermaLink="false">http://knowall.blog.brooklyn.edu/?post_type=ht_kb&#038;p=196</guid>

					<description><![CDATA[Data Encryption For users&#8217; protection, Brooklyn College requires 128-bit Secured Socket Layer (SSL) strong encryption during users&#8217; online sessions with Web Services. Encryption is a sophisticated way of scrambling all information transmitted online before it leaves a user&#8217;s computer, so that all information, including passwords and online bill payments, are...]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">Data Encryption</h3>



<p>For users&#8217; protection, Brooklyn College requires 128-bit Secured Socket Layer (SSL) strong encryption during users&#8217; online sessions with Web Services. Encryption is a sophisticated way of scrambling all information transmitted online before it leaves a user&#8217;s computer, so that all information, including passwords and online bill payments, are completely unreadable by unauthorized third parties. No transactional information will be transmitted without first being encrypted.</p>



<p>Brooklyn College requires that a user&#8217;s Web browser support 128-bit encryption because it is more effective than 40-bit encryption. While 40-bit encryption might be fine for low-risk transactions, it is not adequate for protecting financial transactions. When students supply data via the Internet, it is encrypted before it travels across the World Wide Web. Brooklyn College decodes and processes the data at our end of the transaction process. When we provide data to users, the data is encrypted by the college and sent to the user. When the user receives the data or information, his or her browser decodes the information and displays it to them.</p>



<p>Users can ensure that online information is encrypted in Internet Explorer or Netscape if the small key or lock at the bottom left-hand or right-hand corner of their screen is latched.</p>



<h3 class="wp-block-heading">Database Server Security</h3>



<p>Brooklyn College database servers are protected behind secure firewalls to prevent unwarranted access from the Internet and are protected by multilayered password and encryption security.</p>



<h2 class="wp-block-heading">Family Educational Rights and Privacy Act (FERPA)</h2>



<h3 class="wp-block-heading">What is FERPA (Family Educational Rights and Privacy Act)?</h3>



<p>The Family Educational Rights and Privacy Act of 1974, as amended (also sometimes referred to as the Buckley Amendment), is a federal law regarding the privacy of student records and the obligations of the institution, primarily in the areas of release of the records and the access provided to these records. Any educational institution that receives funds under any program administered by the U.S. Secretary of Education is bound by FERPA requirements. Institutions that fail to comply with FERPA may have funds administered by the Secretary of Education withheld.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://students.brooklyn.edu/knowledge-base/brooklyn-college-privacy-and-ferpa-statements/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>
