Snapchat. YouTube. Amazon Prime NOW. All totally essential apps, amiright? But have you ever gone to download a brand new gaming app that looks suspicious? Low reviews, limited legit feedback, and for some reason, the app needs access to your GPS data?
Tag: security and privacy
Are you getting ready to travel for spring break? You’ve probably thought about measures for your own personal safety, but don’t forget the safety of your mobile devices! Be sure to pack the sunscreen for yourself and the encryption software for your smartphone.
Have you ever received a strange message from a “friend” on Facebook, asking you to share a password or join their new business venture? Maybe they asked some seemingly innocent questions, like your current address, first pet’s name, mother’s maiden name, father’s middle name… if this sounds familiar, you may have been a target of social engineering.
Chief Information Security Officer, Helen Patton, recently took part in the “Gender and Diversity in Information Security” panel at Internet2’s 2016 Technology Exchange. As part of this panel, she shared information about the gender gap in STEM careers in the United States, and in particular, the lack of female representation in information security roles.
Internet2 is a collaborative group of researchers and educational institutions, brought together to find innovative solutions to technology challenges, including the lack of diversity in technology careers.
Chief Information Security Officer Helen Patton sums up the year 2016 on blog site Medium. She discusses the challenges of keeping up with security and privacy regulations, handling theft of intellectual property and dealing with the recent increase in full-blown cyberattacks.
Is Santa bringing you a new smartphone, smartwatch or tablet this year? If so, make sure you know what to do with your old device before trading it in. There might be sensitive information on that ancient device you’d rather not share with the future owner or the retailer who recycles smartphones of Christmases past.
The Office of the Chief Information Officer’s Networking and Enterprise Security teams are collaborating to modify how devices compromised by malware and other security threats are suspended from OCIO’s wireless networks. Affected networks include osuwireless, WiFi@OSU and eduroam.
Previously, Ohio State accounts were prevented from authenticating on osuwireless and eduroam from any device regardless of which device had been compromised.
Did you know there are just a few basic steps you can take to keep your devices and information secure? All you need to remember is that you are the most powerful defense against hackers. Just know, with great power comes great responsibility.
Have you ever received a suspicious email from someone claiming they work for the IRS? Or an out-of-place phone call that asks you to respond to the IRS immediately? What about an unexpected text with an attached tax form? You’re not alone!