Enterprise Security hosts Cybersecurity Days each fall to provide meaningful training and resources to the university community. This year they have expanded the event to offer something for everyone. One specific area of focus is the security needs of researchers. Ohio State recognizes the challenges researchers have protecting the integrity and confidentiality of research data.
Amazon Web Services (AWS) is coming to Ohio State! Join us for an immersion day to meet members of Amazon's team and take a deep dive into learning about AWS, including how it can help you and how to use it securely.
This day will be an engaging, tech-driven event focused on helping you accelerate and secure your journey on AWS. The presentation includes an overview of AWS core services and techniques to secure them. Topics will include security, authentication, elastic cloud computing, best practices for using AWS, networking, use cases, architecture and technical labs.
New semester, new schedule. New tuition payment. Are you sure you are all paid up? So sure that when the scammer calls you threatening to drop your classes if you don’t pay, you are unlikely to hand them your credit card number?
How about that strange text you got from a random number, offering a sweet new job for little work and high pay? You have a few extra hours, right? Why not grab some extra cash while you’re at it?
If you are interested in a future career in the world of information technology, or if you just would like to know how to best protect your online identity and data, Cybersecurity Days Community Forum is a great opportunity to pick up the latest info.
Cybercrime is a crime of opportunity, and your data is a lucrative business. That’s why everyone needs to pay more attention to his or her digital life. Interested in learning more about how you can protect yourself?
In the past, you could simply avoid taking part in the digital world and lead a private, offline life. That's no longer the case. In fact, because so many of the companies you do business with collect personal information, you could assume your information is already in the hands of cybercriminals. We can’t avoid leaving digital footprints.
Cybercrime is a crime of opportunity, and your data is a lucrative business. That’s why everyone should pay more attention to his or her digital life. Interested in learning more about how you can protect yourself?
A phishing campaign has targeted the university, resulting in many students and some faculty and staff receiving numerous fraudulent, harmful messages. The Enterprise Security and OCIO teams are working to address this problem.
What to look for
Features of this campaign have included:
You’ve probably seen many news stories about Facebook and how it handles your personal data. Many of us rely on the online service to keep in touch with family, plan a vacation, chat daily with friends. We rarely think about the digital footprints we leave, or who would ever want to follow our tracks.
Sure, we knew that being fed advertising was part of the deal to use the platform for free. But how many of us actually read the privacy statement when we started using the service? And how many of us noticed the changes they’ve made over time?
Interest in watching Team USA is high. As advertisers vie for your eyeballs with the American flag and the world-famous Olympic rings, it is easy to trust the message. However, just as you should be vigilant about counterfeit merchandise and ticket scams, you should also be aware of your email inbox.
Receive an email about an online lottery promotion where you can win tickets to PyeongChang? All you need to do to win is provide EVERY personal detail about you. What could go wrong, right?
IT Security is increasingly at the forefront in the modern world. Data breaches and IT security topics are in the news all the time. Users need to understand good cyber hygiene to prevent breaches from occurring.
Ohio State considers cybersecurity one of the university’s top priorities. Resources on our new website cybersecurity.osu.edu will teach you how to protect yourself and how to protect Ohio State.
Does that new fitness app you downloaded really need to read your text messages, access your phone status and identity of callers and modify or delete contents of the USB storage on your device? It’s tempting to skip past the list of permissions when you install an app, but it might be nice to know what you’re actually giving it permission to do, and you may even be able to deny some of those permissions and still use the app.