Shoulder surfing is a social engineering technique used by malicious persons who want to see your sensitive credentials in real…
Browsing: Cybersecurity Awareness Month Tip
When browsing the Internet, users are often prompted with the option to “Accept all cookies” to continue. What does this…
You’ve probably heard “The Cloud” used a lot on the internet and most likely have used a service that utilizes…
A VPN enables you to access the internet without letting anyone decipher the information. If you are on public WIFI…
October is National Cybersecurity Awareness Month. During this month the Information Security and Assurance team shares information on safeguarding your…
The use of digital signatures is a way to make communications online more transparent and secure. A digital signature is…
Do you happen to have an old device and looking to upgrade? Maybe you already have a bunch of old…
Mobile devices are our most commonly used technological devices on a day-to-day basis. It is imperative that we secure our…
Typosquatting is when a cybercriminal registers a domain closely related to a legitimate domain, in the hopes to lure unaware…
External hard drives and USB devices are integral to modern technology. They allow you to have data on an easily…