{"id":683,"date":"2025-10-01T08:00:19","date_gmt":"2025-10-01T12:00:19","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=683"},"modified":"2025-09-29T16:12:35","modified_gmt":"2025-09-29T20:12:35","slug":"ncsam-2025-identity-erased","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/10\/01\/ncsam-2025-identity-erased\/","title":{"rendered":"NCSAM 2025: Identity Erased"},"content":{"rendered":"
You thought you were just checking your email. Maybe logging into NEST or streaming a quick episode before your next class. But somewhere\u2014behind the scenes\u2014someone else might be watching.<\/p>\n
Cyber attackers don\u2019t need to break into buildings anymore. All they need is your login. With a single compromised account, they can sneak into email, steal financial info, send phishing attacks from your account, and even lock you out of your own digital life.<\/p>\n
It\u2019s not a ghost story\u2014it\u2019s real, and it happens more often than you\u2019d think.<\/p>\n
So, what happens when your account is compromised? How do you recover\u2014and more importantly\u2014how do you keep the watchers out?<\/p>\n
Let\u2019s break it down.<\/p>\n
Most compromises are detected in one of three ways:<\/p>\n
You notice strange activity<\/strong> (e.g., emails you didn\u2019t send, Duo push notifications you didn\u2019t request).<\/p>\n<\/li>\n Someone reports suspicious emails<\/strong> coming from your account.<\/p>\n<\/li>\n The Information Security team detects unusual login behavior<\/strong> (e.g., logins from unfamiliar locations or devices).<\/p>\n<\/li>\n<\/ul>\n When that happens, your account may be temporarily locked<\/strong> to prevent further misuse.<\/p>\n Once a compromise is confirmed:<\/p>\n Your password will be reset<\/strong> by the Information Security team.<\/p>\n<\/li>\n It’s important to act quickly\u2014delaying could give an attacker more time to access sensitive data or impersonate you.<\/p>\n Protecting your account is a shared responsibility. Here\u2019s what you can do to prevent future compromises:<\/p>\n Use a strong, unique password.<\/strong> Don\u2019t reuse it for other sites.<\/p>\n<\/li>\n Watch out for phishing emails.<\/strong> Never click on suspicious links or share login details.<\/p>\n<\/li>\n Don\u2019t approve unexpected Duo requests.<\/strong> If you didn\u2019t initiate a login, deny it and report it.<\/p>\n<\/li>\n Enable login alerts<\/strong>, if available, so you\u2019re notified of access from new devices.<\/p>\n<\/li>\n Update your recovery email and phone number<\/strong>, so you can be reached securely.<\/p>\n<\/li>\n<\/ul>\n Compromised accounts don\u2019t just affect you\u2014they can be used to send phishing emails, steal data, or target your classmates and instructors. If something seems off, report it right away<\/strong>. You\u2019re not in trouble\u2014you’re part of the solution.<\/p>\n ÌÇÐÄvlog | Information Security Website<\/a><\/p>\n Forbes | How To Know If You\u2019ve Been Hacked, From Accounts To Devices<\/a><\/p>\n Apple | If you think your Apple Account has been compromised<\/a><\/p>\n
\nStep 2: Account Recovery<\/h2>\n
\n
\nStep 3: Prevention Going Forward<\/h2>\n
\n
\nRemember:<\/h2>\n
Have questions or think your account might be at risk?<\/h3>\n
Contact the IT Service Desk<\/a> or your local tech team<\/a>.<\/h3>\n
\nWant to Learn More?<\/h2>\n