Best Practices
Cybersecurity Best Practices
When it comes to cybersecurity, it's easier for cyber criminals to defeat the end user, by tricking them into doing something unintentionally, than it is to defeat the systems and software designed to keep them at bay. Stay vigilant. When using email, pay close attention to the sender’s email a...
Support Request Etiquette
Please start the process of requesting support by creating a new ticket in the WCS Mojo Helpdesk system. https://wcs.mojohelpdesk.com/ If you are unable to complete your work, or if there is a widespread system outage that is impacting several users, (after entering a help ticket) please al...
How to recognize phishing emails
Cyber Safety - Video Series
https://www.youtube.com/watch?v=m-Sy92NjFmY&list=PLAoaH8SfRoZv1KFdJVVMCu4brRzrznEmr&index=2
Phishing Awareness - Google Drive Notification Loophole
It is becoming increasingly more common that scammers are using Google Drive's built in notification system to bypass Google's phishing and spam filters when sending out malicious messages. Essentially what it looks like is a scammer will put together a document that has shady contents and then s...