Whether you’re a Newb, a Wizard or even a Ninja, a cybercriminal can take all the fun out of gaming by luring you into downloading software or clicking a link that infects your computer and exposes your personal info. You can still enjoy gaming with players across the globe by following basic security practices like applying strong passwords, keeping your system current and using common sense (don’t click on weird sh*t).
Tag: security and privacy
Last month, the WannaCry ransomware epidemic spread globally, affecting thousands of victims worldwide by infecting their computers with ransomware. Hackers essentially took computer files hostage until victims paid to have those files unlocked. This month, SANS provides lessons learned from this massive malware attack.
People lose mobile devices. Sometimes they get stolen. They can also be hacked. So we need Enterprise Mobility Management (EMM), and Enterprise Security has reviewed solutions that can work for a widely disparate group of business units, colleges, faculty and staff.
Calling all parents, babysitters and those who watch over young children! The May edition of OUCH!, a monthly security newsletter from the cybersecurity experts at SANS Institute, is all about keeping children safe while using the internet.
When it comes to securing children online, there are both technological challenges and educational challenges:
Has the task of creating a new password every 180 days gotten challenging? Are you running out of ideas for secure passwords to protect your university identity? There is a way to create hard-to-crack passwords, and it’s easier than you might think.
Snapchat. YouTube. Amazon Prime NOW. All totally essential apps, amiright? But have you ever gone to download a brand new gaming app that looks suspicious? Low reviews, limited legit feedback, and for some reason, the app needs access to your GPS data?
Are you getting ready to travel for spring break? You’ve probably thought about measures for your own personal safety, but don’t forget the safety of your mobile devices! Be sure to pack the sunscreen for yourself and the encryption software for your smartphone.
Have you ever received a strange message from a “friend” on Facebook, asking you to share a password or join their new business venture? Maybe they asked some seemingly innocent questions, like your current address, first pet’s name, mother’s maiden name, father’s middle name… if this sounds familiar, you may have been a target of social engineering.
Chief Information Security Officer, Helen Patton, recently took part in the “Gender and Diversity in Information Security” panel at Internet2’s 2016 Technology Exchange. As part of this panel, she shared information about the gender gap in STEM careers in the United States, and in particular, the lack of female representation in information security roles.
Internet2 is a collaborative group of researchers and educational institutions, brought together to find innovative solutions to technology challenges, including the lack of diversity in technology careers.
Chief Information Security Officer Helen Patton sums up the year 2016 on blog site Medium. She discusses the challenges of keeping up with security and privacy regulations, handling theft of intellectual property and dealing with the recent increase in full-blown cyberattacks.