We must stay highly vigilant regarding both our cybersecurity practices and our physical surroundings. The likelihood of disruptive cyberattacks has increased, with bad actors known to engage in sophisticated cyber activities, including espionage, data theft, and network disruption. To counter these threats, we must apply cybersecurity best practices.
- Be Extremely Cautious with Emails and Messages
- Verify the sender
- Phishing:
-
-
- Beware of messages with urgency and threats
- Beware of generic greetings & obvious errors
- Recognize impersonation
-
-
- Hover before you click to see the actual URL.
- Never open unexpected attachments, especially from unknown senders.
- Safely Interact with QR Codes:
- Inspect Before You Scan
- Preview the URL
- Verify the Source
- Be Skeptical of “Too Good to Be True” Offers
- Use Your Device’s Default Scanner
- Strengthen Your Credentials with Multi-Factor Authentication (MFA) wherever you can
- Use Strong, Unique Passwords and Password Managers
- Keep Software Updated
- Report Suspicious Activity to UCOR Cybersecurity/IT Promptly
We encourage everyone to refresh their knowledge on our internal security protocols and stay informed about global events. Your diligence in both cyberspace and physical environments is crucial to protecting yourself and our organization
If have any questions, please contact UCOR Cybersecurity or IT.







