Follow these six National Cyber Security Alliance recommendations to better protect yourself online and make the Internet more secure for everyone: Fortify each online account or device. Enable the strongest authentication tools available. This might include biometrics, security keys, or unique one-time codes sent to your mobile device. Usernames and passwords are not enough to […]
Author Archives: ifleming
Step Up to Stronger Passwords
A password is often all that stands between you and sensitive data. It’s also often all that stands between a cybercriminal and your account. Below are tips to help you create stronger passwords, manage them more easily, and take one further step to protect against account theft. Always: Use a unique password for each account […]
Don’t Be Fooled! Protect Yourself and Your Identity
According to the US Department of Justice, more than 17 million Americans were victims of identity theft in 2014. EDUCAUSE research shows that 21 percent of respondents to the annual ECAR student study have had an online account hacked, and 14 percent have had a computer, tablet, or smartphone stolen. Online fraud is an ongoing […]
Information Security Tips for Travel
We all like to travel with our mobile devices (smartphones, laptops, or tablets) — whether it’s to the coffee shop around the corner or to a café in Paris. These devices make it easy for us to stay connected while on the go, but they can also store a lot of information — including contacts, […]
Learn What It Takes to Refuse the Phishing Bait!
Cybercriminals know the best strategies for gaining access to your institution’s sensitive data. In most cases, it doesn’t involve them rappelling from a ceiling’s skylight and deftly avoiding a laser detection system to hack into your servers; instead, they simply manipulate a community member. According to IBM’s 2014 Cyber Security Intelligence Index, human error is […]
Phishing Alert from USG Cybersecurity
Hello Colleagues, As we enter tax season, please be alert for an increase in phishing attempts. For the past few years, criminals have enjoyed some success using email campaigns to trick us into supplying our personal information to them. While phishing has many forms, campaigns this time of the year invite us to access our […]
Watch Out for the “Tech Support Scam’
What is a “tech support scam”? This increasingly common scam usually starts with a pop-up or unsolicited phone call from someone claiming to be Microsoft or your Internet Service Provider. The individual or ad will claim your computer is infected with malware and will attempt to convince you to buy and install a fake remedy […]
KSU Student Arrested for Hacking – Keylogger Use Suspected
A student at Kennesaw State University was recently arrested on charges that he hacked into the school’s systems and changed grades. When police searched his home, they found a notebook containing numerous KSU employee usernames and passwords. It is very likely this information was captured with the use of a software or hardware keylogger. Keyloggers are devices […]
Amazon.com Found Reused Passwords – Was Yours One of Them?
Amazon.com has announced that during some sort of routine account security monitoring, the company discovered a large cache of usernames and passwords on the Internet that were reused for Amazon.com accounts. Since the scope and nature of this data has yet to be disclosed, it is highly advisable that everyone change his/her Amazon.com password and enable two factor […]
Tips for Avoiding Malware from the FTC
Malware – a portmanteau of “malicious software” – is any unwanted program that interferes or subverts the normal, everyday use of computing device. Malware continues to proliferate through email and on the Internet and although malware can be difficult to discern from legitimate software, the FTC has compiled a great list of easy-to-remember steps you can take to […]