AI scams use voice cloning deepfakes to impersonate loved ones or coworkers.
Scammers only need 30 seconds of audio/video to create fakes.
Message form
Office of The University Chief Information Officer

First In the Region
For Students
For Alumni
Why UWI
AI scams use voice cloning deepfakes to impersonate loved ones or coworkers.
Scammers only need 30 seconds of audio/video to create fakes.
Message form
Office of The University Chief Information Officer
Have you ever received a mail that tells you to click a link and put your information urgently? This could be a phishing attack. Phishing is basically a scheme used by most scammers to get your information through the internet.
Phishing is a type of social engineering attack in which a fraudulent message is sent to a target to trick the victim into handing over sensitive information or create an entry for installing viruses or ransomware. Read More
Message form
Office of The University Chief Information Officer
Many people store their personal or work-related information and passwords on a computer, smartphone and tablet in a word doc, excel file or even a sticky note. Of course this is not safe at all. This information can easily be stolen when you leave one of your devices unattended or when a hacker manages to get access to your data. You can imagine that information, such as your passwords, stored in an organized, clear overview is like winning the lottery for people with malicious intentions.
Message form
Office of The University Chief Information Officer
You will be surprised of what people with bad intentions can do with the information shared on your social media accounts. Think about mail addresses, important locations, relatives, hobbies and so on. It may not seem such a big deal to you when you post a picture of yourself on the beach in France, but for the person with bad intentions, this can be a green light to break into your home when you’re enjoying your vacation.
Message form
Office of The University Chief Information Officer
Never, ever send account and password information over an open (unsecured) wireless connection. You are broadcasting to everyone within the radius of your wireless signal, which can be several hundred feet, all of your personal information and account information. They can use this to compromise your accounts (e.g. email, financial, system/application access), steal your identity, or commit fraud in your name.
Message form
Office of The University Chief Information Officer
Office of the Vice Chancellor
The University of the West Indies
Regional Headquarters
Kingston 7, Jamaica, W.I.
Tel: (876) 927-1660-9 Exts. 2336/2339
Fax: (876)927-0253
Email: vcoffice@uwimona.edu.jm
Copyright © 2025,The University of the West Indies