Multi-factor Authentication
Posted November 13, 2020
Stolen account access is one of the most common ways individuals, institutions, and organizations become vulnerable to cyberattacks. Scams targeting account compromise (gaining unauthorized...Posted November 13, 2020
Stolen account access is one of the most common ways individuals, institutions, and organizations become vulnerable to cyberattacks. Scams targeting account compromise (gaining unauthorized...Posted September 16, 2020
With classes kicking off this week, Northwestern IT’s Information Security Office has important tips to ensure everyone starts the academic year strong and secure....Posted May 21, 2020
A major part of the adjustment to remote work and school has been the regular use of videoconferencing tools. Zoom is one of the...Posted February 25, 2020
Have you considered a career in Cybersecurity? It is a fast-paced, highly dynamic field with a huge number of specialties to choose from, including...Posted February 18, 2020
Bad guys are very persistent, eventually, anyone can make a mistake. If a phone call from the “Help Desk” doesn’t sound quite right, if...Posted February 13, 2020
Did you know you are 100 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling,...Posted January 30, 2020
Turn off Bluetooth if you are not using it on your computer or device. Not only does this make it more secure, but it...Posted November 14, 2019
The Dark Web is a network of systems connected to the Internet designed to share information securely and anonymously. These capabilities are abused by...Posted November 6, 2019
When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to...Posted October 30, 2019
https://www.bleepingcomputer.com/news/security/malicious-apps-on-alexa-or-google-home-can-spy-or-steal-passwords/ PSA: Don’t put your Google Home/Alexa near a window from homeautomation