{"id":2075,"date":"2017-06-06T12:01:15","date_gmt":"2017-06-06T17:01:15","guid":{"rendered":"http:\/\/blogs.uww.edu\/uptimes\/?p=2075"},"modified":"2017-06-06T12:01:15","modified_gmt":"2017-06-06T17:01:15","slug":"phishing-scam-contest-winner","status":"publish","type":"post","link":"https:\/\/blogs.uww.edu\/uptimes\/phishing-scam-contest-winner\/","title":{"rendered":"Phishing Scam Contest Winner!"},"content":{"rendered":"<p>During the 2017 Spring Divisional Meeting for ICIT, there was an exercise called: \u201cSpot that Phish!\u201d The purpose of this exercise was to become more familiar with security measures on campus, and learn to identify malicious content and phishing scams. There were 5 members of ICIT who wrote in their names and correctly identified every threat in the phishing emails: Shane Degen, Tarin Lintemuth, Bradley Schwoerer, Kelly Ingram, and Mike Olson. We pulled a random name out of a hat and Kelly Ingram was the lucky winner! Kelly is now the owner of a brand new iPad mini. Congratulations Kelly and thank you to everyone who participated in this exercise.<\/p>\n<p>As a reminder, please continue to be vigilant of ongoing phishing scams and remember to consider these key points:<\/p>\n<ol>\n<li>Check the sender of the incoming email.<br \/>\n\u2022 Safe: helpdesk@uww.edu Not Safe: helpdesk@uwww.ed<\/li>\n<li>What kind of information is being requested?\n<ul>\n<li>Do not trust any requests that ask for your password or other personal identification.<\/li>\n<\/ul>\n<\/li>\n<li>Check the links.\n<ul>\n<li>Hover over links to make sure they are going to a trusted webpage before clicking on them.<\/li>\n<\/ul>\n<\/li>\n<li>Check the content.\n<ul>\n<li>Make sure the message actually makes sense. Be wary of \u201cforced urgency\u201d, weird characters, and spelling mistakes.<\/li>\n<\/ul>\n<\/li>\n<\/ol>\n<p><a href=\"http:\/\/blogs.uww.edu\/uptimes\/files\/2017\/06\/Kelly-Ingram-ipad-crop.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-2089\" src=\"http:\/\/blogs.uww.edu\/uptimes\/files\/2017\/06\/Kelly-Ingram-ipad-crop-282x300.jpg\" alt=\"Kelly Ingram ipad crop\" width=\"282\" height=\"300\" srcset=\"https:\/\/blogs.uww.edu\/uptimes\/files\/2017\/06\/Kelly-Ingram-ipad-crop-282x300.jpg 282w, https:\/\/blogs.uww.edu\/uptimes\/files\/2017\/06\/Kelly-Ingram-ipad-crop-962x1024.jpg 962w\" sizes=\"auto, (max-width: 282px) 100vw, 282px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During the 2017 Spring Divisional Meeting for ICIT, there was an exercise called: \u201cSpot that Phish!\u201d The purpose of this exercise was to become more familiar with security measures on campus, and learn to identify malicious content and phishing scams. There were 5 members of ICIT who wrote in their names and correctly identified every &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/blogs.uww.edu\/uptimes\/phishing-scam-contest-winner\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Phishing Scam Contest Winner!&#8221;<\/span><\/a><\/p>\n","protected":false},"author":205,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[72],"tags":[],"class_list":["post-2075","post","type-post","status-publish","format-standard","hentry","category-general-news"],"_links":{"self":[{"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/posts\/2075","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/users\/205"}],"replies":[{"embeddable":true,"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/comments?post=2075"}],"version-history":[{"count":5,"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/posts\/2075\/revisions"}],"predecessor-version":[{"id":2091,"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/posts\/2075\/revisions\/2091"}],"wp:attachment":[{"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/media?parent=2075"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/categories?post=2075"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blogs.uww.edu\/uptimes\/wp-json\/wp\/v2\/tags?post=2075"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}