This holiday season, while you are traveling around to visit loved ones, you shouldn’t have to worry about protecting your mobile devices. However, with each convenience a smartphone or tablet provides (think Google Maps and shopping apps), new threats can arise.
Tag: security and privacy
Have you ever received an email that looks like it’s from your bank, but the grammar is a bit off? What about an email from a friend, but the intro says “Greetings Sir” instead of addressing you by name? Chances are you’ve received several of these phishing emails in your lifetime. If you are unfamiliar with phishing, SANS will get you up to speed!
Identity theft is an important issue year-round, but tax season calls for heightened vigilance among those filing online. According to the United States Department of Justice, in 2013 “over 5 million tax returns were filed using stolen identities, claiming approximately $30 billion in refunds.”
We don’t want your identity to be one of those stolen for fraudulent tax returns, so we’re sharing useful tips from the Internal Revenue Service (IRS) that can help keep your identity safe this tax season.
You are cordially invited to attend our fourth annual Cyber Security Day event at the Ohio Union on Thursday, October 15, 2015. Again this year, the event begins with the keynote, the "Security Year in Review," presented by Helen Patton, Chief Information Security Officer of The Ohio State University.
New this year, we are providing opportunities for peer networking and partnership formation, and allowing for more audience interaction, by offering guided discussions we are calling “Birds of a Feather” sessions (BOFs).
Windows infrastructure administrators and application developers are invited to attend six hours of in-depth security training at the fourth annual Cyber Security Day event at the Ohio Union on Thursday, October 15, 2015.
Windows Infrastructure Security Training
Let’s be honest. You use the same password for almost EVERYTHING. Maybe you at least have a separate password for personal sites and work-related applications. Maybe. We all know unique passwords are the best practice in cyber security, but how do you remember all those different capital letters, special symbols and passphrases?
The October edition of OUCH!, a monthly security awareness newsletter from the cybersecurity experts at SANS Institute, has an answer...
Enterprise Security has developed a new tool for financial officers, IT leaders and security liaisons: the Information Security Self-Assessment (ISSA). Where the annual Information Risk Survey provides a high-level approximation of information risk, the Information Security Self-Assessment will measure both the level of compliance to Ohio State’s Information Security Standard and the level of effectiveness of the security controls that organizations have implemented.
The ISSA is available in two formats:
“We will get hacked; it’s inevitable. And it will probably happen more than once.”
Helen Patton shared those opening words when she attended the recent University Communications monthly social media meeting. One of the topics at the September meeting was a discussion about the recent hacker attack affecting three University of Michigan Facebook pages. On Wednesday, August 12, the Michigan Football, Michigan Basketball and Michigan Athletics Facebook pages were defaced with malicious postings. In the full article, Helen elaborates on proactive measures we can take for protecting our institutional social media accounts from hacker attacks.