You probably wouldn’t give your ATM card and PIN to a stranger and then walk away. So, why would you give away your username and password? Your login credentials protect information as valuable as the money in your checking account.
PCs and Macs are targets of cybercriminals. They exploit your devices to steal your data and use your device to attack others. Here are some things you can do to help ensure that you are not a victim.
Social Media Security
From posting reviews to keeping in touch with family, social media can enhance our lives. However, it also poses security risks that are uniquely its own. In order to ensure you and your family's safety, we recommend the following security guidelines when using social media.
Identifying Phishing Scams
Phishing (pronounced "fishing") is an email scam designed to acquire sensitive information from the target (you). The most successful phishing emails are designed to look like the email comes from a reputable source.
For a deeper look into Information Security, check out our extensive list of articles, blogs, and more!
IT Security Systems Used On Campus
Pulse Secure - This is the secured VPN client application used on campus, an integrated virtual private network with network access control and mobile security solutions.
Palo Alto - Enables the prevention of successful cyberattacks with an automated approach that delivers consistent security across clouds, networks, and mobile devices
Duo - Allows for Multi-factor Authentication (MFA)
Sophos - Products for communication endpoint, encryption, network security, email security, mobile security and unified threat management (malware prevention).