Your identity shouldn’t get a vacation

Warm weather is here, summer vacations are booked, and you’re ready to unwind. However, it’s important that while you relax your mind and break free from everyday stresses, that you remain vigilant in securing your identity. Wi-Fi hotspots in coffee shops, airports and other public areas are convenient, yes, but what you do is also public knowledge to anyone else on the same network. If you’d ensure your belongings are safe and secure, why wouldn’t you do the same with your data? Consider reading up on the FTC’s advice to securely using Public Wi-Fi Networkswhat device settings you should change and consider using the University’s VPN, Cisco Anyconnect VPN to secure your connection when using WiFi and block any unwanted hackers.


FBI Warns Consumers about “Juice Jacking”

Have you ever been out in public only to realize your phone has lost its charge? You may be tempted to take advantage of the public phone charging stations you see at an airport or mall for instance, but this could put you at risk for “Juice Jacking”. The FBI warns bad actors are corrupting the USB ports as a way to introduce malware and monitoring software onto your devices. Our advice – make a habit of carrying your own charging cord and use an electrical outlet instead. Most importantly, always be sure your phone is running on the most recent software update.


Secure your mobile device

Did you know more than a third of mobile device users don’t lock or secure their phones? With much of your personal information stored in portable devices, it is crucial to add extra security to protect your identity from being stolen in the event your device is lost or stolen. Today’s smartphones and tablets are equipped with different security types – passcodes, finger print, facial recognition etc. Find out what features you can use on your devices to gain peace of mind, knowing your information is secure. Visit University IT’s Mobile Device Security page for more information and tips on securing your mobile device, including what to do if your device is lost or stolen.