Your laptop goes missing. Your smartphone gets smashed. Your primary computer’s drive crashes. Any of these would make for a bad day, but all of them would be made worse if you didn’t have a… Continue Reading Back up your data strategically
Join us on October 8 at Union South to learn the tips and tricks you need to avoid computing hazards, such as viruses, scams, and stolen passwords. Enjoy free pizza and soft drinks, talks from… Continue Reading Enjoy free pizza and the chance to win a tablet
News stories are reporting that RhinoLabs has identified two Big 10 Universities and multiple government agencies that have not applied patches to vulnerable campus solutions products as well as other Oracle products. The latest patch… Continue Reading Report on Oracle vulnerabilities
You probably have heard of the term “malware.” Malware is short for malicious software, which includes viruses, worms, spyware, Trojan horses, and rootkits. Malware is used by cybercriminals to achieve specific goals, such as stealing… Continue Reading Malware development service and the black market
The problem with passwords is that they are quickly becoming dated. Even if you use strong passwords, with newer technologies it is becoming easier for cyber attackers to crack passwords and collect credentials. Multi-factor authentication… Continue Reading Use multi-factor authentication to protect data
Many companies like Google flag websites that show signs of a threat and leverage other networks to propagate the blacklisting of these dangerous sites. In some cases, the Internet service provider might present a warning… Continue Reading Danger: Malware ahead!
The latest tech scams are coming through harassing telephone calls. These calls attempt to entice victims to provide personal information, financial information or ask them to grant access to their computer. This is known as… Continue Reading Don’t let yourself get “Vished”
Campus departments sometimes need to handle restricted data on University-owned machines.It is important to know how to properly handle such data to be sure it is safe. To address this, the Office of the CIO… Continue Reading New rules for handling restricted data on your University-owned computer