Browsing: Cyber Security Awareness Month Tip
October, 2022
The WannaCry Ransomware Attack
Dumpster Diving: How to Dispose of Information Properly
Shoulder Surfing: Accessing Sensitive Information
What Are Cookies?
What is The Cloud?
Should You Get a Virtual Private Network (VPN)?
University Authorized Phishing Campaign
Digital Signatures: Why They are Important
How to Dispose of Your Electronic Devices
How to Make Your Mobile Device More Secure
Typosquatting: Why You Should Be Aware of What Websites You Access
Do Not Just Plug Anything Into Your Computer
What’s a Firewall?
iOS Security Practices
Why is Two-Factor Authentication (2FA) Important?
Spam: How to Limit How Much You Get
Social Media: How to Stay Safe
Phone Call Scams
Corrupted QR Codes Pose Threat to Businesses, Universities
Strong Passwords for Cybersecurity Awareness Month
2022 National Cybersecurity Awareness Month
September, 2022
October, 2021
The Internet of Things (IoT)
Separate email accounts
Why you should not give in to scare tactics
You posted what?
Trojan Virus: What is it and How to avoid it
Protect Yourself from Identity Theft!
How To Avoid Being Hit With Ransomware
What is Ransomware?
Be Wary of Tech Support Scams, From Cold Calls to Web Browser Pop-ups
Cyber Secure at Work
Phishing with Shortened LinkedIn® URLs
Phishing & Spoofing
Protecting Your Privacy Online
Multi-Factor Authentication
Cybersecurity While Traveling
Creating a Strong Password
Staying CyberSafe on Social Media
How To Recognize An Internet Scam And What You Can Do To Protect Yourself
Why is Cybersecurity Important?
October, 2020
Be wary of tech support scams, from cold calls or web browser popups.
Protect your Data with Strong Passwords!
Protect Yourself from Identity Theft!
Don’t Fall for Scams. Be Wary of Scare Tactics!
Watch out for these types of Phishing Attacks!!
Be Wary of Smishing and Vishing Scams
What is Phishing?
Protect your Devices!
November, 2018
October, 2018
October, 2017
Steps you can take to keep your mobile device safe.
Encrypt your mobile devices.
Strong passwords (or phrases) can keep you safe.
Backup all of your devices, and do it often!
Keep your mobile device safe!
Additional steps to say protected.
Don’t pay the Ransom!
What is Malware?
Keep antivirus protection up to date. Get your free Antivirus software from Fordham University.
What is Ransomware?
Take Fordham’s Cyber Security Awareness training.
Monitor all your accounts for suspicious activity.
Be wary of tech support scams, cold calls or web browser popups.
Identity Protection Tips
Guard Yourself Against Identity Theft
Dont Fall for Scare Tactics!
Cyber Criminals Are After Your Information
Have you heard of Spear and Whale Phishing?
What are Smishing and Vishing?
What is Phishing?
September, 2017
October, 2016
Tip #21 Get Antivirus Protection!
Tip #20 Avoid Unlicensed Mobile Applications
Tip #19 Don’t Let Your Computer Get Sick (Viruses)
Tip #18 Gone Phishing? Don’t Get Hooked!
Tip #17 Don’t Be Forced to Pay for Your Stuff! (Ransomware)
Tip #16 Be Wary of Malware
Tip #15 Be Aware of Your File Sharing Settings
Tip #14 Be Wary of Mandatory Software Downloads for Wi-Fi Access
Tip #13 Pay Attention to Permissions and Privacy Policies
Tip #12 Keep Software Up-To-Date
Tip #11 Use Two-Factor Authentication
Tip #10 Avoid Conducting Sensitive Business over Public Wi-Fi Networks
Tip #9 Think Before you Connect
Tip #8 Secure Your Mobile Device
Tip #7 Secure Your Accounts
Tip #6 Set Strong Passwords
Tip #5 When in Doubt, Throw it out!
Tip #4 Keep Your Private Information Private
Tip #3 Secure Your Network
Tip #2: Disable Remote Connectivity When Not in Use
Tip #1 Keep a Clean Machine
August, 2016
October, 2015
Tip #22 Cyberbullying: How to Get Help
Tip #21 So There’s No Fault: Default to No Automatic Downloads
Tip #20 Public WiFi: Use Sparingly and Safely
Tip #19 Deal of the Century! (Too bad it’s a scam!)
Tip #18 Are You SURE You Want to Download that App?
Tip #17 Free Antivirus Protection from Fordham
Tip #16 Tips for a Strong, Secure Password
Tip #15 Your First Line of Defense: Strong Passwords
Tip #14 First It Was Phishing, Now It’s Smishing
Tip #13 Is that a Fish on Sale or a Phish?
Tip #12 The Upshot on Updates
Tip #11 Cell Phone Theft
Tip #10 Geotagging and Location Sharing–Just Don’t!
Tip #9 Think Twice (Or Thrice) Before You Post
Tip #8 Identity Theft: Signs and Solutions
Tip #7 Check before you click!
Tip #6 How to Hide Behind Your Screen Names
Tip #5 What’s that person doing in my computer?
Tip #4 | You Shared WHAT about Yourself Online??
Tip #3 | Don’t Share THAT about Yourself Online!
Tip #2 | Sharing Online with Friends, Cautiously
Tip #1 | Spam: Report and Delete!
March, 2010
October, 2008