Updating...

Skip to main content
University of Missouri System Home Page (opens in a new tab)
  • All
  • Knowledge Base
  • Service Catalog
Sign In
MUHC Information Security Client Portal
  • Sign In
  • Search
  • Home
  • Services
  • Knowledge Base
  • More Applications
    Skip to Knowledge Base content
    • Search Articles
    1. Knowledge Base
    2. Social Engineering/Phishing Attacks

     Social Engineering/Phishing Attacks

    Tips and examples of social engineering tactics

    Articles (1)

    Recognizing social engineering attacks (phishing, smishing, etc)

    This article provides tips for identifying social engineering attacks and what to do to avoid falling for a scam.
    Blank

    Popular Articles

    • Documents Related to Information Security Reviews and Solution Management
    • Recognizing social engineering attacks (phishing, smishing, etc)
    • Data Classification
    • Guidelines for Working Offsite
    • Triage Forms
    View All Popular Articles

    Recent Articles

    • Information Security Risk Exception Form
    • MUHC Department Managed Application Documentation
    • Triage Forms
    • Documents Related to Information Security Reviews and Solution Management
    • Information System Activity Review Overview
    View All Recent Articles

    Popular Tags

    • application (2)
    • auditing (2)
    • business-owner (2)
    • data-custodian (2)
    • executive-sponsor (2)
    • hipaa (2)
    • log (2)
    • logging (2)
    • medical-device (2)
    • procurement (2)
    View All Tags

    Copyright © 2024 — University of Missouri Healthcare — Curators of the University of Missouri. All rights reserved. DMCA and other copyright information.
    Equal Opportunity/Access/Affirmative Action/Pro Disabled & Veteran Employer.
    For website information, contact the Office of Communications.