You’ve heard of encryption and you know it’s something you are supposed to do in order to protect the information on your devices…but do you know how to do it? Encryption changes your information into cipher-text, which is unreadable for those without a password or other type of key (like a fingerprint). Lucky for you, many services and devices automatically encrypt your personal information! Even so, it’s still important to know how to enable encryption to keep your information safe from hackers.
Tag: security and privacy
In the course of your work for The Ohio State University, you will be given access to many types of information about university business and research, which is referred to as institutional data. As an institutional data user, you must be aware of the responsibilities entrusted to you in preserving the security and confidentiality of this information, as outlined in the Institutional Data policy (IDP).
Ray Bradbury predicted it back in 1950 in his short story “There Will Come Soft Rains”—household appliances and devices being set to automatically make breakfast, clean the house, open the garage door and more. In 2016, 10 years ahead of Bradbury’s scenario, we’re already entering this world thanks to the Internet of Things.
Sometimes you can just tell something is up with your computer: your passwords no longer work, programs are turning on randomly, your friends question your latest “business opportunity,” the list goes on. You dread what these signs could mean—you’ve been hacked. But don’t panic. You need to act fast to shake off the bad situation before it gets worse.
The university community has been reporting more instances of phishing email attempts than usual to Ohio State Enterprise Security.
Cybercriminals have begun to use familiar names of senior leaders at Ohio State, such as President Drake, in an effort to gain your trust. These bogus phishing emails are examples of spoofing.
Digital viruses, also known as malware, can infect your computer, cause annoying symptoms and threaten your privacy. These viruses target every gadget including PC, Mac and mobile devices. While you are having fun with your computers and smartphones, don’t forget to boost the immune system of these tech toys.
They say getting Wi-Fi connections is one of many relationship goals. But do you know the best way to secure your home network so it’s only shared between you and your significant others? How about the best way to track what devices are connecting to your network? Do you know how to prevent others who are trying to steal your Wi-Fi - and your privacy?