Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»CISO»Cybersecurity and Data Assurance in the Lead-Up to the Presidential Election
    CISO

    Cybersecurity and Data Assurance in the Lead-Up to the Presidential Election

    By Jason Benedict, CISSP, CISM, C|CISOOctober 15, 20245 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    As we approach the final stretch of the presidential election, now only 22 days away, it is essential to be vigilant about cybersecurity threats that could impact students, faculty, and the broader Fordham community. In an increasingly digital world, political events like elections often become targets for malicious activities, including disinformation campaigns, phishing attacks, and data breaches. Here’s what you need to know about these risks and how you can protect yourself and the Fordham community.

    1. Disinformation and Misinformation Campaigns

    One of the biggest threats in the weeks leading up to the election is the spread of disinformation—false information intended to mislead—and misinformation—incorrect information spread without malicious intent. Both can create confusion, particularly around election procedures, voting methods, and results.

    How It Affects You:
    • Social Media Misinformation: Political misinformation campaigns often spread rapidly on social media platforms like Twitter, Facebook, and Instagram. These campaigns aim to distort facts, influence opinions, or discourage voter participation. Students and faculty may unknowingly engage with or share misleading content.
    • Deepfakes and Manipulated Media: Deepfake technology, which uses AI to create hyper-realistic fake videos, is another emerging concern. These can be used to impersonate political figures, spread false claims, or incite panic.
    What You Can Do:
    • Verify Before You Share: Before sharing election-related content on social media, verify the information through trusted sources such as official news outlets or government websites. Platforms like FactCheck.org, PolitiFact, and Snopes are helpful for verifying claims.
    • Be Wary of Sensational Headlines: Misinformation often spreads through exaggerated headlines. If something seems too outrageous or shocking, it’s worth investigating further before engaging.
    • Check URLs: Always ensure that you’re accessing trusted websites by checking the URL. Cybercriminals often create fake news websites with URLs similar to legitimate ones to spread false information.

    2. Phishing and Social Engineering Attacks

    Cybercriminals often exploit major events like elections to launch phishing and social engineering attacks, aiming to steal personal information or gain access to sensitive systems. In the lead-up to Election Day, you might receive emails or messages that appear to be from political organizations, government bodies, or even Fordham-affiliated groups.

    How It Affects You:
    • Election-Themed Phishing: These phishing emails may claim to provide important election information or request personal details to “confirm your voter registration.” Some may even mimic official communications from political campaigns, urging you to donate or take action.
    • Social Engineering via Social Media: Attackers may pose as trusted friends or organizations on social media, encouraging you to click on links that lead to malicious websites or asking you for personal information under false pretenses.
    What You Can Do:
    • Double-Check Email Sources: Be suspicious of any email or message related to elections that asks for personal information, especially if it comes from an unfamiliar source. Always verify the sender’s identity by checking the email address carefully or contacting the organization directly.
    • Avoid Clicking on Suspicious Links: If you receive unsolicited messages or emails that contain links or attachments, especially with election-related content, do not click them. Hover over links to verify their legitimacy first.
    • Enable Two-Factor Authentication (2FA): Strengthen the security of your accounts other than those at Fordham by enabling 2FA on your social media accounts. This adds an extra layer of protection, requiring more than just your password to access your accounts.

    3. Cybersecurity Threats to Voting Systems

    Although the security of physical voting machines may seem distant from Fordham’s day-to-day activities, there is a broader concern over the potential cyber vulnerabilities of voting systems. Cyberattacks aimed at voter registration systems or election databases could impact the integrity of the election or sow doubt in the results.

    How It Affects You:
    • Election Integrity Concerns: Even if you are voting absentee or through early voting, widespread concerns over voting system security could lead to confusion, delays, or even doubts about election results.
    What You Can Do:
    • Vote Early, If Possible: To minimize the impact of potential system issues on Election Day, consider voting early or using absentee ballots if available.
    • Stay Informed: Keep an eye on official updates from your local election board regarding voting procedures and potential system outages.

    4. Protecting Academic and Personal Data

    Election-related cyber threats may not just target individuals but also universities. Institutions of higher education, which handle a large amount of sensitive data, are increasingly attractive targets for cyberattacks. These attacks could be aimed at disrupting the academic process, stealing research data, or causing reputational damage.

    How It Affects Fordham:
    • Increased Cyber Threats: Universities across the nation have reported a rise in cyberattacks during politically charged periods. These attacks may come in the form of ransomware or attempts to steal sensitive academic or personal data.
    • Data Breaches: If attackers successfully breach university systems, the personal information of students and faculty—such as addresses, phone numbers, and even Social Security numbers—could be exposed or exploited.
    What You Can Do:
    • Use Strong, Unique Passwords: Ensure that all your accounts, including your Fordham account, are secured with strong, unique passwords. Avoid using the same password across multiple platforms.
    • Update Your Software: Keep your devices and software up-to-date. Regular updates often contain patches for known vulnerabilities, reducing the likelihood of cyberattacks.
    • Report Suspicious Activity: If you notice any suspicious activity on your Fordham accounts or devices, report it immediately to the IT department or the Office of Information Security.

    5. Stay Informed and Vigilant

    In these last 22 days leading up to the presidential election, cybersecurity awareness is more critical than ever. Stay informed, stay cautious, and take steps to protect your personal data, Fordham’s digital assets, and the integrity of your online engagements. By being vigilant, we can ensure that our community remains secure and resilient during this pivotal time.

    For more cybersecurity tips and resources, visit Fordham University’s Information Security Blog. Stay safe, stay informed, and let’s navigate this election season with care and cybersecurity in mind.


    Contact Information:
    If you have any concerns or need assistance, please reach out to Fordham IT’s Help Desk at (718) 817-3999 or email HelpIT@fordham.edu.

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Previous ArticleGoogle Groups Vulnerability
    Next Article Patches and Software Updates 

    Related Posts

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Incident Response: Why Everyone Needs a Plan for Cyber Threats

    Patches and Software Updates 

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d