by Trisha Clay Social engineering begins with research, whereby an attacker reaches out to a target to gain information and resources. When someone you don’t know contacts you and asks you open-ended questions, this may be the first step of a social-engineering attack. After the attacker reaches out to you, they will then attempt to establish […]
Security
Take Ownership of Your Privacy
by Valerie Vogel Tuesday, January 28, 2020 Social media and mobile apps allow people to stay connected with friends and family, organize their work and personal lives, learn new things, explore new interests or activities, make travel plans, play games, or binge-watch the latest shows. However, these technologies also introduce a plethora of ways for […]
Good Cybercitizens Make the Internet a Safer and Better Place
By Eva M. Owen “The Internet is a powerful and useful tool, but in the same way that you shouldn’t drive without buckling your seat belt or ride a bike without a helmet, you shouldn’t venture online without taking some basic precautions.” This is an important reminder from the National Cyber Security Alliance that cybersecurity […]
Pending Windows Updates Needing Installed
Due to the recent cyber security warnings that have been circulating in the news, the Office of Information Systems is issuing this announcement to encourage users to reboot their computers as soon as reasonably possible. We are seeing computers that have updates pending an install. We need you to restart your computer to allow these […]
Get Smart! Mitigating Risks in Connected Devices
by Kim Milford December 17, 2018 Smart/IoT devices may be the panacea for consumer convenience. Do you want to know and change the temperature of your house or even your fridge remotely? There’s an app for that. Such devices also raise extreme privacy concerns about the data collected about you. Devices can track or discern […]