  {"id":683,"date":"2025-10-01T08:00:19","date_gmt":"2025-10-01T12:00:19","guid":{"rendered":"https:\/\/www.montclair.edu\/phish-files\/?p=683"},"modified":"2025-09-29T16:12:35","modified_gmt":"2025-09-29T20:12:35","slug":"ncsam-2025-identity-erased","status":"publish","type":"post","link":"https:\/\/www.montclair.edu\/phish-files\/2025\/10\/01\/ncsam-2025-identity-erased\/","title":{"rendered":"NCSAM 2025: Identity Erased"},"content":{"rendered":"<p data-start=\"281\" data-end=\"485\">You thought you were just checking your email. Maybe logging into NEST or streaming a quick episode before your next class. But somewhere\u2014behind the scenes\u2014someone else might be watching.<\/p>\n<p data-start=\"487\" data-end=\"746\">Cyber attackers don\u2019t need to break into buildings anymore. All they need is your login. With a single compromised account, they can sneak into email, steal financial info, send phishing attacks from your account, and even lock you out of your own digital life.<\/p>\n<p data-start=\"748\" data-end=\"825\">It\u2019s not a ghost story\u2014it\u2019s real, and it happens more often than you\u2019d think.<\/p>\n<p data-start=\"827\" data-end=\"960\">So, what happens when your account is compromised? How do you recover\u2014and more importantly\u2014how do you keep the watchers out?<\/p>\n<p data-start=\"962\" data-end=\"982\">Let\u2019s break it down.<\/p>\n<hr data-start=\"628\" data-end=\"631\" \/>\n<h2 data-start=\"633\" data-end=\"672\">Step 1: Detecting the Compromise<\/h2>\n<p data-start=\"674\" data-end=\"725\">Most compromises are detected in one of three ways:<\/p>\n<ul data-start=\"726\" data-end=\"1007\">\n<li data-start=\"726\" data-end=\"834\">\n<p data-start=\"728\" data-end=\"834\"><strong data-start=\"728\" data-end=\"759\">You notice strange activity<\/strong> (e.g., emails you didn\u2019t send, Duo push notifications you didn\u2019t request).<\/p>\n<\/li>\n<li data-start=\"835\" data-end=\"900\">\n<p data-start=\"837\" data-end=\"900\"><strong data-start=\"837\" data-end=\"874\">Someone reports suspicious emails<\/strong> coming from your account.<\/p>\n<\/li>\n<li data-start=\"901\" data-end=\"1007\">\n<p data-start=\"903\" data-end=\"1007\"><strong data-start=\"903\" data-end=\"954\">The Information Security team detects unusual login behavior<\/strong> (e.g., logins from unfamiliar locations or devices).<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1009\" data-end=\"1097\">When that happens, your account may be temporarily <strong data-start=\"1060\" data-end=\"1070\">locked<\/strong> to prevent further misuse.<\/p>\n<hr data-start=\"1099\" data-end=\"1102\" \/>\n<h2 data-start=\"1104\" data-end=\"1135\">Step 2: Account Recovery<\/h2>\n<p data-start=\"1137\" data-end=\"1168\">Once a compromise is confirmed:<\/p>\n<ol data-start=\"1169\" data-end=\"1422\">\n<li data-start=\"1169\" data-end=\"1230\">\n<p data-start=\"1172\" data-end=\"1230\"><strong data-start=\"1172\" data-end=\"1203\">Your password will be reset<\/strong> by the Information Security team.<\/p>\n<\/li>\n<li data-start=\"1169\" data-end=\"1230\"><strong>A ServiceNow ticket will created<\/strong> and you will receive instructions via your personal email address on file.<\/li>\n<li data-start=\"1169\" data-end=\"1230\"><strong>Complete the recovery process<\/strong>. If any issues arise, contact the IT Service Desk or your local tech team.<\/li>\n<\/ol>\n<p data-start=\"1424\" data-end=\"1540\">It&#8217;s important to act quickly\u2014delaying could give an attacker more time to access sensitive data or impersonate you.<\/p>\n<hr data-start=\"1542\" data-end=\"1545\" \/>\n<h2 data-start=\"2002\" data-end=\"2042\">Step 3: Prevention Going Forward<\/h2>\n<p data-start=\"2044\" data-end=\"2149\">Protecting your account is a shared responsibility. Here\u2019s what you can do to prevent future compromises:<\/p>\n<ul data-start=\"2151\" data-end=\"2583\">\n<li data-start=\"2151\" data-end=\"2219\">\n<p data-start=\"2153\" data-end=\"2219\"><strong data-start=\"2153\" data-end=\"2187\">Use a strong, unique password.<\/strong> Don\u2019t reuse it for other sites.<\/p>\n<\/li>\n<li data-start=\"2220\" data-end=\"2312\">\n<p data-start=\"2222\" data-end=\"2312\"><strong data-start=\"2222\" data-end=\"2256\">Watch out for phishing emails.<\/strong> Never click on suspicious links or share login details.<\/p>\n<\/li>\n<li data-start=\"2313\" data-end=\"2412\">\n<p data-start=\"2315\" data-end=\"2412\"><strong data-start=\"2315\" data-end=\"2357\">Don\u2019t approve unexpected Duo requests.<\/strong> If you didn\u2019t initiate a login, deny it and report it.<\/p>\n<\/li>\n<li data-start=\"2413\" data-end=\"2500\">\n<p data-start=\"2415\" data-end=\"2500\"><strong data-start=\"2415\" data-end=\"2438\">Enable login alerts<\/strong>, if available, so you\u2019re notified of access from new devices.<\/p>\n<\/li>\n<li data-start=\"2501\" data-end=\"2583\">\n<p data-start=\"2503\" data-end=\"2583\"><strong data-start=\"2503\" data-end=\"2550\">Update your recovery email and phone number<\/strong>, so you can be reached securely.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"2585\" data-end=\"2588\" \/>\n<h2 data-start=\"2590\" data-end=\"2606\">Remember:<\/h2>\n<p data-start=\"2608\" data-end=\"2848\">Compromised accounts don\u2019t just affect you\u2014they can be used to send phishing emails, steal data, or target your classmates and instructors. If something seems off, <strong data-start=\"2772\" data-end=\"2796\">report it right away<\/strong>. You\u2019re not in trouble\u2014you&#8217;re part of the solution.<\/p>\n<h3>Have questions or think your account might be at risk?<\/h3>\n<h3 data-start=\"2850\" data-end=\"3036\">Contact the <a href=\"https:\/\/www.montclair.edu\/information-technology\/it-service-desk\/\">IT Service Desk<\/a> or your <a href=\"https:\/\/www.montclair.edu\/information-technology\/it-service-desk\/academic-unit-support\">local tech team<\/a>.<\/h3>\n<hr data-start=\"2585\" data-end=\"2588\" \/>\n<h2>Want to Learn More?<\/h2>\n<p>精品成人福利在线 University | <a href=\"https:\/\/www.montclair.edu\/information-technology\/security\/\">Information Security Website<\/a><\/p>\n<p>Forbes | <a href=\"https:\/\/www.forbes.com\/sites\/technology\/article\/how-to-tell-if-you-have-been-hacked\/\">How To Know If You\u2019ve Been Hacked, From Accounts To Devices<\/a><\/p>\n<p>Apple | <a href=\"https:\/\/support.apple.com\/en-us\/102560\">If you think your Apple Account has been compromised<\/a><\/p>\n<p>Google | <a href=\"https:\/\/support.google.com\/accounts\/answer\/140921?hl=en\">Investigate suspicious activity on your account<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You thought you were just checking your email. Maybe logging into NEST or streaming a quick episode before your next class. But somewhere\u2014behind the scenes\u2014someone else might be watching. Cyber attackers don\u2019t need to break into buildings anymore. All they need is your login. With a single compromised account, they can sneak into email, steal [&hellip;]<\/p>\n","protected":false},"author":349,"featured_media":1090,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[5],"tags":[],"class_list":["post-683","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/users\/349"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/comments?post=683"}],"version-history":[{"count":4,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/683\/revisions"}],"predecessor-version":[{"id":1091,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/posts\/683\/revisions\/1091"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media\/1090"}],"wp:attachment":[{"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/media?parent=683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/categories?post=683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montclair.edu\/phish-files\/wp-json\/wp\/v2\/tags?post=683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}