Chief Information Security Officer Helen Patton sums up the year 2016 on blog site Medium. She discusses the challenges of keeping up with security and privacy regulations, handling theft of intellectual property and dealing with the recent increase in full-blown cyberattacks.
Enterprise Security has taken a number of steps to cultivate the cybersecurity professionals of tomorrow. Most recently, the team helped host Cooltechgirls’ “Think Like a Hacker” event in early December.
After a short program explaining the security aspects of geocaching, participants worked through a cybersecurity activity that challenged them to use their newly-gained knowledge to tackle a problem similar to one that a security professional might need to solve in real life.
Is Santa bringing you a new smartphone, smartwatch or tablet this year? If so, make sure you know what to do with your old device before trading it in. There might be sensitive information on that ancient device you’d rather not share with the future owner or the retailer who recycles smartphones of Christmases past.
This week we’ve seen a surge of phishing attacks against the university. Most recently we spotted a malicious website posing as a login page for BuckeyeMail and wanted to bring it to your attention. Please avoid clicking on links in emails when possible and always verify you’re at the site you meant to be at before entering user name and password. If you receive an email phish please report it to firstname.lastname@example.org. By informing us, we can more easily target and block other emails and sites from the same source.
Cybersecurity offers fun and challenging careers, and shows like Homeland, CSI Cyber and Mr. Robot have made it cool.
But to really captivate the security geniuses of tomorrow, observing isn’t enough. They want to get involved and be challenged. That’s idea behind CoolTechGirls’ Think Like a Hacker event on Dec. 3.
The Office of the Chief Information Officer’s Networking and Enterprise Security teams are collaborating to modify how devices compromised by malware and other security threats are suspended from OCIO’s wireless networks. Affected networks include osuwireless, WiFi@OSU and eduroam.
Previously, Ohio State accounts were prevented from authenticating on osuwireless and eduroam from any device regardless of which device had been compromised.
Did you know there are just a few basic steps you can take to keep your devices and information secure? All you need to remember is that you are the most powerful defense against hackers. Just know, with great power comes great responsibility.
Have you ever received a suspicious email from someone claiming they work for the IRS? Or an out-of-place phone call that asks you to respond to the IRS immediately? What about an unexpected text with an attached tax form? You’re not alone!
You’ve likely sent a text to your mom that started as innocent—until autocorrect had some fun with your message. But have you ever sent an email to the wrong auto-completed address? Or written an email while angry and then accidentally replied to an entire group of coworkers? Including your boss?
In the September edition of OUCH!, a monthly security newsletter from the cybersecurity experts at SANS Institute, you can learn simple email etiquette, appropriate for all your personal and professional communications.