91Ï㽶ÊÓƵ

Behind the Scenes: IT People and Products Defending Against Phishing

Phishing attacks are on the rise, but 91Ï㽶ÊÓƵ is ready. With cutting-edge digital tools, a team of skilled engineers, and regular cybersecurity training for our university community, we are constantly working to keep you protected.

The combination of powerful technology and skilled professionals quickly blocked 99% of the 1 million messages that blasted university accounts in the most recent phishing attempt. That level of protection doesn’t happen by accident. By strategically deploying the Division of IT's three key pillars of defense, most dangerous emails are blocked before anyone notices.

24/7 digital protection tools

Pillar 1: 24/7 Digital Protection Tools

Real-time AI identifies and blocks phishing attempts, malware, and other malicious content before it reaches your inbox. This is a massive layer of protection; for context, these tools suppressed over 7 million spam emails during winter break.

This protective barrier starts by scanning email attachments and embedded web links in a secure environment to block anything harmful. It also uses anti-impersonation protection to spot and intercept emails pretending to be trusted people, such as university administrators.

decorative

Pillar 2: YOU! 

Suspicious emails you forward to phish@kent.edu can be one of the first clues that phishing has broken through the automated defenses.

Your involvement in phishing defense has been invaluable. The phish@kent.edu email address has received over 31,000 emails in the last few years- many of which alerted the Division of IT to an unseen threat. Your participation in phishing simulations provides a safe way to educate the university community on recognizing and reporting malicious emails. THANK YOU for your diligence. 

countermeasures by trained engineers

Pillar 3: Countermeasures by Trained Engineers

In the most recent attack, the team quickly discovered that the attachments themselves weren't malicious or infected. However, the text files directed people to a Google Form requesting their login information, revealing that this was, indeed, a phishing attack.

As the attack parameters became clear, the team implemented custom defenses. The offending emails were removed from university inboxes and the sending email address blocked. Dangerous links or websites were reported to external parties for takedown, and the team updated Microsoft’s security systems while adding protections to prevent similar attacks.

As these breach attempts continue increasing, remember, YOU are the first line of human defense! By staying alert and reporting suspicious emails, you play a vital role in keeping 91Ï㽶ÊÓƵ’s digital environment safe. Together with the Division of IT’s advanced defenses, we can stop phishing attacks before they cause harm.
 

It only takes one click—whether clicking a suspicious link (dangerous) or forwarding the email (safe). Choose wisely! Forward to phish@kent.edu.

POSTED: Wednesday, January 15, 2025 10:40 AM
WRITTEN BY:
Alison Haynes

Tags