Let’s get SMART
The Tip This holiday season, many of us will be buying or receiving gifts that are ’Smart’ and will be internet connected and a part of the Internet of Things (IoT). Whether it’s a television or a personal assistant, fitness …
The Tip This holiday season, many of us will be buying or receiving gifts that are ’Smart’ and will be internet connected and a part of the Internet of Things (IoT). Whether it’s a television or a personal assistant, fitness …
The Tip Some of the big players in tech these days don’t want you to think about security all, it should be as easy as breathing. Although this is a nice utopian vision that we would all like to see …
The Tip As 2018 is nearly in the books, we thought we’d do a little googling for the top cybersecurity tips. There are a LOT of lists to be found out there, but the top 10 seem pretty consistant everywhere. …
The Tip This week will be a little different. Last week, as many of you know by now, we sent a simulated phish test out to the portion of our community that is support staff and full-time faculty. This was …
Recently a few people have been asking us about using 3rd-party add-ons to gmail such as ‘Boomerang’ and ‘Email Studio for Gmail’. These add-ons will add power tools and features to gmail such as scheduled mail, reminders, smarter auto-responder options …
The Tip Strong security isn’t just about complicated rules around passwords and anti-virus software and malware and managing access. Many important habits for safeguarding your important personal and work information build down to common sense and physical security and generally …
The Tip The odds are really against us when it comes to data/account breaches. It’s not really a question of if, so much as a question of when. How would we know that our account has been breached and what …
The Tip Passwords are our first line of defence in cybersecurity. So why do so many of us have bad password habits? Who knows. It just seems to be human nature. Readily available hacker scripts can guess most bad passwords …
The Tip Everything from personal information, personal photos, work correspondence, to your banking information and social media activity is valuable. If it’s valuable to you, it’s valuable to cybercriminals. In fact, some of it is valuable to cybercriminals without you …
The Tip As the smartphone market has matured and become a part of everyday life for most of us, the proliferation of bad actors in the app market has kept pace. The Detail We’ve all come to depend on apps …
The Tip Cybersecurity month, week one. The internet is something we all share, and we all share a responsibility for keeping it safe. Thankfully there are simple ways we can all contribute to our collective Human Firewall. The Detail Get …
The Tip Well, it was a nice summer break from blogging Cybersecurity, but the new school year is well underway and it’s time to start thinking Cybersecurity again. This week is not so much a tip as it is a greeting and …