• it-banner-np

Cyber Security

  •  NCSAM Champion logo 

    Cyber Security is a Shared Responsibility

    Cyber Security is something all computer users should be aware of and practice every day.  IT is offering these resources as part of the the October 2013 National Cyber Awareness Month (NCSAM) campaign, but will be available and updated year round. New and updated information will be advertised through University email and the IT Twitter account. 

    It starts with STOP. THINK. CONNECT. A simple action for all of us to employ to stay safer and more secure online...

    STOP: Before you use the Internet, take time to understand the risks and learn how to spot potential problems. 

    THINK: Take a moment to be certain the path ahead is clear. Watch for warning signs and consider how your actions online could impact your safety, or your family’s. 

    CONNECT: Enjoy the Internet with greater confidence, knowing you have taken the right steps to safeguard yourself and your computer.  


    On this page:
    Resources - Cyber Safety Tips - Literacy - ArticlesVideos - PodcastsCampaign Sponsors   



    Cyber Safety Tips 

     Summer Tips 

    • Protect your laptop, smartphone or other portable devices when traveling. Just as your wallet contains lots of important and personal information that you wouldn't want to lose, so too do your portable devices. Don't let them out of your sight! Never store your laptop as checked luggage. If there is a room safe available at your hotel, use it to securely store your devices. Also, make sure you have strong passwords on these devices in case they are lost or stolen. 
    • Be aware that public computers and public wireless access are not secure. Cyber criminals can potentially access any information you provide, such as credit card numbers, confidential information or passwords. So don't conduct any sensitive transactions at the local free Wi-Fi site. 
    • Save the vacation posts 'til you get back. It may be tempting to post details of where and when you'll be traveling. Don't. By revealing such specifics, you are providing information that could be used by criminals to break into your house while you're gone. Another common scam involves using compromised email accounts to contact the victim's friends or family with requests for help, claiming that the person was robbed in a foreign country while on vacation and needs money.   

     Cyber Security Literacy

     Reporting Cyber Crime
    Reproduced with permission. www.SecurityCartoon.com 


    Use a Security Code to Lock Your Phone (TrendMicro, August 2013)
    For whatever reason, most people do not lock their mobile phones. Unfortunately, this is what cyber criminals depend on. All the personal private information is there for the taking with no effort at all by the thief. Here are siimple instructions for setting the security PIN on your mobile phone.

    Anatomy of an Email Scam (July 2013)
    There have been two email scams circulating the Internet recently. The first claims to have reset your Pinterest "email" account. There is no such thing.  Do not click the link! The second entices you to login to "your" Blackboard account. This email is designed to capture your password. Again, don't click the link! The document above discusses the anatomy of social engineered email scams in detail using the these two email messages as examples. The information can be a used to identify similar emails that may get past spam and virus filters.

     Thousands of Yahoo accounts compromised (ZDnet, July 2012)
    The Yahoo accounts security breach was a eye-opening event. Thousands of accounts were compromised. The only solution is to reset your passwords regularly. Here are some tools to help you manage passwords:

    Password Managers
    It is also highly advisable to use different passwords for different accounts. However, most users have many accounts. If you are in this situation, consider a password manage. Here are several suggestions:

     iPhone/iPad Apps 

    • Find My iPhone (cNet Downloads) 
      [From Apple] If you misplace your iPhone, iPad, iPod touch, or Mac, the Find My iPhone app will let you use another iOS device to find it and protect your data. Simply install this free app on another iOS device, open it, and sign in with your Apple ID.Find My iPhone will help you locate your missing device on a map, play a sound, display a message, remotely lock your device, or erase all the data on it… 
    • Two apps keep your iPhone and iPad data private (Cnet How To, July 10, 2012)
      Discusses two third party apps, Secure Folder and Contacts Pro 

    Apps for Android devices (at Google Play) 

    • Where’s my Droid 
    • Mobile Security Personal Ed.
      [Google Play review] Free antivirus and malware protection for Android smartphones and tablets this is one of PCWorld USA’s Top 100 products of 2011
    • Droid Crypt
      [Google Play review] An intelligent and application-oriented file encryption tool. 

    Self-Help Videos;


    • Getting Smart About Security(WeLiveSecurity.com)
      This discussion covers resources for cyber security information and what are some precautions you can take to protect yourself. [6 minutes]. 

    Campaign Sponsors