
Tips:
Did you know that?
Pay attention to detail.
In many instances, preparing food items can be accomplished over moderate heat in partially-covered cookware. This also controls the amount of steam or smoke that is produced. Food continues to cook after it is removed from the heat source. Simply keep it covered!!
If a cooking incident creates excessive smoke conditions:
Reference information courtesy of USFA, National Fire Protection Association, the Hartford and Science Daily.
It could take a year to 16 months before a victim realizes their identity has been compromised? Protect your 'house'.
If you suspect that your identity has been compromised:
For additional information, visit the following sites:
Reference material courtesy of U.S. Postal Service, FTC and realtysecurity.com.
The following is guidance and safety tips regarding catalytic converter thefts:
Why do thieves target catalytic converters?
Thieves target catalytic converters because they contain precious metals and are valuable as scrap metal. Catalytic converters are vulnerable because they’re quick and easy to steal. Thieves typically use cutting tools and can remove them in just a few minutes. Catalytic converters are expensive to replace, and can cost on average up to $2000.
Is there a certain type of vehicle that is more vulnerable?
Any vehicle can be a target for catalytic converter theft. However, low-emission/hybrid vehicles are targeted more often because they contain more of the expensive metals. Thieves may also target trucks and SUVs because the higher ground clearance allows for easier access.
How do I know if my catalytic converter was stolen?
When you start your car, you’ll know by the unusually loud exhaust noise (rumbling or roaring sound) that your catalytic converter was stolen. This sound gets louder when you hit the gas. Go to the back of your car and look underneath. The catalytic converter is a round canister that connects two pieces of pipe in the exhaust. You will see a gaping space in the middle of your exhaust if the converter is missing, and you will likely see cut marks where the pipe was cut away. See photos below.
What do I do if my catalytic converter is stolen?
How can I prevent catalytic converter theft?
If you observe any suspicious activity or behavior such as an individual loitering around vehicles, peering into vehicles, trying door handles, or wandering in an area without legitimate business, call the Southern Police Department at (203) 392-5375, 911 or via the Livesafe app.
Content obtained from the University of Hawaii Department of Public Safety.
Have you been a victim of fraud, phishing attempts, spam emails, or other increasing cyber-attacks? Surely, you have seen at least one come through your various inboxes.
Consider this: You received an email with a tempting job offer from a friend, professor, or classmate. You are asked to kindly provide some personal information to be considered for the position. What would you do with the email? Would you question its validity? If so, how would you make sure it isn’t a scam?
Conversely, what if you suddenly receive countless email replies inquiring about an email you never sent yourself? How do you find out what happened and what to do next?
Both of these scenarios depict being a victim of a cyber-attack. Universities around the country are being targeted with scams such as this, Southern Connecticut State University included. As cyber-attacks increase and adapt new techniques every day to skirt around spam filters and disguise the attacks, understanding how to identify suspicious activities become a vital first step to preventing it. Spam and phishing messages will unfortunately come through our email inboxes occasionally as we continue to rely heavily on communicating through our digital spaces.
It is incredibly important you continually question the validity of requests you receive, no matter who they are from or what they are offering or requesting. Our best defense against these kinds of attacks is you!
Click here to view the FBI New Haven Field Division Press Release
The “What” and ”Why”
Why are they targeting you? What are they looking to gain? These efforts at phishing attempts are usually directed at obtaining personal identifying and financial information so that they can use the information for eventual financial gain. If you have been a victim of cyber-attacks, you are advised to closely monitor your credit reports, credit cards and banking accounts for any unusual activity.
What could happen to you? Countless consequences can stem from being a victim of phishing attempts, one being identity theft. There are no limits to what impacts these actions can have on you now, or in your future.
The ”How”
Depending on the type of phishing attempt, they will look to gain access to your sensitive information in various ways. This can include having you easily provide the information to them, or by having you click a link or download a file so they can gain access to your accounts, and therefore your sensitive information accessible inside your account, themselves.
If your password does become compromised, SCSU accounts have the added protection of requiring Multifactor Authentication. This adds another layer of security between hackers and your information. However, if you were to approve an MFA request that you did not initiate by accident, you have just provided these individuals access through this layer.
Gaining access to your information does not just occur virtually, however. Actions such as writing your password down on a post-it note, sharing a password with a friend, or signing into your account on a device that is not yours and forgetting to log out after, could leave you vulnerable to having information stolen.
Even if all the scammers gain from you is the ability to send emails from your account, this now provides a new stream and audience to which the scammers can now target, all while impersonating a user from inside the institution, such as SCSU. This is another reason why you must be suspicious of all emails, no matter who they are coming from. Any email address can become compromised.
The Prevention
The Action Plan
If you end up being the victim of a cyber-attack, there are steps you can take to resecure your accounts and information which will vary depending on what has occurred and what information was provided.
It takes much less time and effort to start with suspicion than it would take to put the pieces back together after your information is already compromised and in the hands of strangers to do what they wish with. Would you hand the keys to your car or your cell phone to a stranger who came up and asked to take them? Treat your virtual pieces of information as you do your physical belongings; Keep them close, keep them safe, and be weary of who you trust with them.