2.5.24

When was the last time you updated your device?

General software updates provide several benefits to your devices and keep them running smoothly. University IT warns that hackers love a good security flaw, and updates can patch software vulnerabilities. Opting out leaves you exposed to malware when malicious actors take advantage of weaker, out-of-date systems. Why should this be a concern to you? Chances are you have a lot of personal data on your devices (passwords, bank information) that becomes an open book to hackers. These viruses can infect friends, family, and colleagues. Many University-managed systems and devices are updated remotely, however, maintaining personal devices is up to you. Look for University IT announcements when critical updates require your immediate attention. Find more information and suggestions on updating your devices.

2.12.24

Falling in love versus falling victim to romance scams

Dating apps and social networking have become popular for people trying to meet someone new. University IT shares that users may find themselves tangled up in more than just romance. These fraudsters invest several months learning about the victim’s life and professing their love to gain their target’s trust and ask for money. The FTC warns consumers of the red flags that scammers use to get into your wallet. Social media and dating sites continue to monitor and block suspicious behavior, however, awareness and vigilance are key to avoid getting crushed by online romance scams. For more social media safety tips, visit University IT’s website.

You can also attend the next “Ask Security Anything” session on Thursday, February 15, at 3 p.m. Add the event to your calendar.

2.26.24

Are you familiar with the University’s Data Security Classifications Policy?

University employees often have access to sensitive information. University IT stresses the importance of familiarizing yourself with the Data Security Classifications Policy and where data can be stored. It is crucial to understand the difference between high-, moderate-, and low-risk information to ensure you responsibly handle confidential data and prevent security breaches or HIPAA violations. If you have a question on data classifications, contact your sector’s information security officer: Mark Baker for research and education, Jim Purvis for clinical and administrative, or the Office of Counsel.