Skip to main
University-wide Navigation

Criminal Minds

See the below video series "Criminal Minds"

Organizations receive cyber-attacks an estimated every 11 seconds.  Explore the criminal minds behind these attacks and learn tips to prevent them as journalist Joe Shy interviews Una Smith, a convicted ex-cybercriminal.   

 Note: These videos are only for UK students, faculty, and staff. You will be prompted to sign in with your UK Microsoft365 account to view the videos. For help logging in, see How Do I log into Microsoft 365?

Criminal Minds

Episode 1 - Tailgating

Physical security and access control should remain a top priority. Get inside the mind of ex-cybercriminal Una Smith as she explains tailgating and shows the damage that can be done if social engineers gain unauthorized access to an organization by simply following someone into the building.

Episode 2 - Data Loss

Backing up information to USB or other external devices is often against an organization's information security policy - and for good reason! If they end up in the wrong hands sensitive data can be leaked which can cost the organization a lot of money and their reputation. Ensure you do everything you can to mitigate this risk of data loss. Always apply good data protection and privacy principles.

Episode 3 - Spear Phishing

Social media is where cybercriminals get information to craft their scams. The more details they can get, the more tailored and believable it is. This is called spear phishing. Avoid oversharing, and never use your work credentials for personal purposes. If your account access is compromised, it is an easy way for cybercriminals to get inside your organization.

Episode 4 - Ransomware

When cybercriminals use phishing, they can target an entire organization using a ransomware program. If a malicious attachment or link is clicked on, ransomware can be downloaded to a machine or spread throughout the network rendering files inaccessible until an amount of money is paid.

Episode 5 - Cloud Apps

Avoid oversharing online. Cybercriminals often look for information that can be used to crack your passwords. After all, it is only a password that stands between them and sensitive information stored on cloud applications. Make sure you know how to secure your data and what to look out for when using cloud apps.

Episode 6 - Compromise

Through phishing scams, cybercriminals can gain access to an email system. They then monitor emails and can intercept an invoice requiring payment - this can cost an organization or individuals. Learn more about email compromise and how to protect yourself and your organization. Criminals apply the same tactics to organizations - also known as business email compromise or BEC.

Episode 7 - Social Media

Social media websites and chat apps are one of the biggest gateways for cybercriminals. Make sure you understand how they use popular social media platforms for scams and how to make sure you do not fall victim to their phishing scams.

Episode 8 - Mobile Applications

Cybercriminals can target you on your mobile devices. One of the ways they can do this is by using applications to distribute malware. When downloading apps only do so from verified app stores and not from a link received in an email. And always be careful how much information you share with the app.