We lock our doors and have alarm systems to prevent break-ins in our homes. So why don’t we extend the same precautions for our online safety? In this interconnected world, someone gaining access to your home wifi could be catastrophic.…
We lock our doors and have alarm systems to prevent break-ins in our homes. So why don’t we extend the same precautions for our online safety? In this interconnected world, someone gaining access to your home wifi could be catastrophic.…
The amount of personal information that’s just a Google away is pretty scary. With just a name and area code, or a phone number, you can find out addresses, family members, and even criminal records on sites like Whitepages and…
We often think of hackers hunched over a computer, typing out code furiously to hack into the mainframe. But what about hackers who don’t fit that stereotype? With just a little knowledge of human behavior, they can manipulate people into…
It’s a little burst of happiness when you find some public wifi at the airport or at the mall, especially if you’re running low on data. But this opportunity is often too good to be true. One of the problems…
Phishing – a word that strikes fear in the heart of anyone concerned with cybersecurity. Which should be everyone. Once mainly an email-based attack, phishing has developed into smishing (phishing via text) and vishing (phishing via phone call). What are…
“But I don’t have anything worth stealing!” You’ve probably thought this to yourself before, reading ITS’ dire warnings about how to stay protected. You’re pretty unimportant in the grand scheme of things as far as hackers are concerned, right? There…
The FBI recently suggested that internet users reboot their routers. This, they said, was because “foreign cyber actors have compromised hundreds of thousands of home and office routers and other networked devices worldwide.” This is a pretty scary thought. Indeed,…
ITS recently received information about a new phishing scam circulating, targeting students who have internships. This particular email is poorly executed, but the idea is clever and worth being aware of. The email reads: Hello Admin, 2018 CIEE Internship is…
Even in these internet security-savvy times, it can still be all too easy to post something on your social media that has unintended consequences. The internet is a very public place, and anything you post can be accessed by anyone,…
If you’re in the process of spring cleaning, you might have found some old devices that you don’t need anymore. Donating these is a great way to help the environment and declutter your home, but it’s essential that the device…
For faculty and staff with student workers who need to access files and send emails on their behalf, just telling the student their login credentials may seem like the simplest option. Unfortunately, this gives the student worker access to all…
Cybercriminals are getting better at manipulating people, and we need to keep up with them. Approximately ninety-five percent of security mishaps are in some part due to human error. Learn the signs of phishing and stay on the lookout for…
Have you ever noticed that Facebook’s ads seem suspiciously similar to whatever you last looked at on Amazon? Or Googled? Many people are aware that Facebook gathers data from other websites that you visit so they can target your ads…
How good are you at spotting phishing? Do you notice anything wrong with this email? See if you can spot all the signs of phishing. (Hint: if you click the photo, it will open in another tab for easier viewing.)…
ITS doesn’t keep drilling the importance of strong passwords for nothing. In our increasingly online world, we can’t afford to have weak passwords that open us up to attack and identity theft. A strong password is an essential part of…