Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Tip #12 The Upshot on Updates
    Cyber Security Awareness Month Tip

    Tip #12 The Upshot on Updates

    By Elizabeth CornellOctober 16, 2015Updated:October 30, 20152 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link
    Image: Shutterstock
    Image: Shutterstock

    Your car needs regular servicing to keep it in good condition.  Your computer, mobile devices, and software applications need regular “check-ups,” as well. 

    When your computer, mobile device, or software application requires an update, make sure it gets done. Attackers look for security loopholes in operating systems and the software that runs on them. These gaps need closing in order to make sure your system and personal information are safe.

    The newest version of any operating system—be it Microsoft Windows, Apple Mac OS X, or Linux—is generally the safest to use. When a security patch or update is released, seriously consider upgrading, unless you’ve been instructed otherwise. (If Fordham IT believes a new version will be incompatible with some of the University systems, the community is asked to wait to update for a short time while we run tests.)

    Similarly, every piece of software installed on your system may need updating from time to time, to close known security holes. Software that needs frequent updating includes the common applications that allow you view online content, read PDF files, or watch videos. Since Java, Adobe Reader, and Flash are installed on millions of computers, their popularity makes them a common target for attackers. For more information about the latest updates, go to their company’s respective websites.

    Lastly, it’s essential to update your anti-virus software and to always use the most updated version of your web browser to avoid falling victim to infected websites. Fordham University offers free antivirus protection to all students, faculty and staff. More information about antivirus protection is on our website.

     

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Exploits and Vulnerabilities Identity Theft
    Previous ArticleTip #11 Cell Phone Theft
    Next Article Tip #13 Is that a Fish on Sale or a Phish?

    Related Posts

    Password Reuse Epidemic: Nearly Half of User Logins Compromised

    Cybersecurity Alert: Risks of Abandoned Websites

    Incident Response: Why Everyone Needs a Plan for Cyber Threats

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d