Tags » Security

Next »
Training Tip: Set Up Two-Factor Authentication on a New Device
Your smartphone is a convenient option to verify your identity for two-factor authentication (2FA). If you upgrade to a new phone but are using the same phone number, you can follow More)
Training Tip: Get to Know Phishing, Part 3
The final term in this month’s phishing series is SMiShing. These phishing attacks via SMS (text messages) are scams that attempt to trick users into supplying content or clicking on a link in SMS messages on their mobile devices. Flaws in how caller (More)
Training Tip: Get to Know Phishing, Part 2
Phishing doesn’t have to happen over email - phone calls are just as easy to spoof. This week’s term is vishing. Also known as voice phishing, these are calls from attackers claiming to be government agencies such as the IRS, software vendors like (More)
Training Tip: Get to Know Phishing, Part 1
This month, IT Services is sharing a three-part series of Training Tips on the different types of phishing. Even if you follow best practices to avoid these deceptive messages, it’s important to know the different types of social engineering being us (More)
Training Tip: Protect Your Devices While Traveling
Whether you are traveling around the U.S. or abroad this summer, prepare your tech devices for the trip. Before heading out, back up any local files stored on your devices and password-protect or remove files that contain personal information. For (More)
Training Tip: Make Digital Learning Materials Accessible
IT Services, in collaboration with Student Disability Services, recently released a blog series on how faculty and instructors can make digital (More)
Training Tip: Create a Strong CNet Password
A strong CNet password is your first line of defense against anyone trying to gain access to your University account. The guidelines for a secure University password is one that contains at least 12 characters and combines letters, numbers, and symbo (More)
Training Tip: Store Your Logins with a Password Manager
It can be difficult to remember your login information for every account, especially when you are using are strong, complex passwords. Many web browsers and email clients offer to store passwords and passphrases for you, but this is not the most secu (More)
Training Tip: Avoid Email Scams
IT Services has been monitoring an active, persistent scam that is targeting staff at the University as well as many other institutions. These types of email scams use messaging to press a recipient to act quickly, usually asking the recipient to pur (More)
Training Tip: Enhance Your IoT Device Security
The Internet of Things (IoT) encompasses many devices such as smart TVs, smart speakers, wearables, and smart appliances. Many of these devices are now being leveraged for application development, research studies, and teaching and learning. One t (More)
Next »