• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Bloomington Indiana University Bloomington IU Bloomington

Menu
Open Search

The College of Arts & Sciences


Information Technology Support in The College

  • About Us
  • Support Request
    • Chem ITG
    • Zone 4 (CITO)
    • Footprints (PBS)
    • IT Incident
    • By Zone or Department
    • Zoom Support
    • Kaltura Support
    • Canvas Support
    • Help Me Decide
  • Storage
    • IU Box Retirement
    • IU Box Migration Dashboard
    • Storage @ IU
    • Cloud Storage
    • OneDrive
    • Google Drive
    • Geode
    • Scholarly Data Archive (SDA)
    • Unit File Servers
    • Critical Data Infrastructure
  • Security
    • IT Policies
    • Data Classifications
    • HIPAA
    • FERPA
    • SecureMyResearch Cookbook
    • Compliance Lookup Tool
    • Acceptable Use Agreement
  • Services
    • Linux Administration – Landscape
    • Future Development
  • Software
    • Software and Services Selection Process Form
    • OriginPro
  • Resources
    • Zoom/Canvas Solutions
    • COVID-19
    • Faculty IT Advisory Council
    • Faculty Tech Guide
    • For IT Pros
    • High Performance Computing (HPC)
    • IT Outages/Construction Alerts
    • One.IU
    • IUware
    • IUanyWare
    • IU Knowledge Base
    • IU Fax
    • Campus Networks Speedtest
  • Contact Us
    • By Zone or Department
    • IT People
    • College Technology Leadership Team (CTLT)
    • CoAS Storage Architect
  • Search
  • IT Notices
  • Anonymous Feedback
Box READ ONLY on March 1
  • Home
  • Beware of a new phishing scam

Beware of a new phishing scam

May 30, 2018

Spotlight Image

GDPR regulations create opportunity for new criminal activity.

As the General Data Protection Regulation (GDPR) takes effect in the European Union, companies are scrambling to make sure their communications are compliant. That means notifying customers through email and providing a link to update communications preferences.

To no one’s surprise, cybercriminals are seizing the opportunity to simulate those emails to steal information or install malware. In addition to financial institutions, crooks are targeting Apple, the Ford Foundation, and AirBnB.

With this in mind, stay vigilant about hovering over links, inspecting “From” fields, visiting homepages instead of clicking links, and maintaining a healthy skepticism about actions requested in email.


Previous
Next
  • The College of Arts & Sciences
  • COLL+IT

The College of Arts & Sciences

Indiana University

Accessibility | Privacy Notice | Copyright © 2021 The Trustees of Indiana University

  • About Us
  • Support Request
    • Chem ITG
    • Zone 4 (CITO)
    • Footprints (PBS)
    • IT Incident
    • By Zone or Department
    • Zoom Support
    • Kaltura Support
    • Canvas Support
    • Help Me Decide
  • Storage
    • IU Box Retirement
    • IU Box Migration Dashboard
    • Storage @ IU
    • Cloud Storage
    • OneDrive
    • Google Drive
    • Geode
    • Scholarly Data Archive (SDA)
    • Unit File Servers
    • Critical Data Infrastructure
  • Security
    • IT Policies
    • Data Classifications
    • HIPAA
    • FERPA
    • SecureMyResearch Cookbook
    • Compliance Lookup Tool
    • Acceptable Use Agreement
  • Services
    • Linux Administration – Landscape
    • Future Development
  • Software
    • Software and Services Selection Process Form
    • OriginPro
  • Resources
    • Zoom/Canvas Solutions
    • COVID-19
    • Faculty IT Advisory Council
    • Faculty Tech Guide
    • For IT Pros
    • High Performance Computing (HPC)
    • IT Outages/Construction Alerts
    • One.IU
    • IUware
    • IUanyWare
    • IU Knowledge Base
    • IU Fax
    • Campus Networks Speedtest
  • Contact Us
    • By Zone or Department
    • IT People
    • College Technology Leadership Team (CTLT)
    • CoAS Storage Architect

The College of Arts & Sciences