Skip to main content

Category: Uncategorized

Multi-factor Authentication

Stolen account access is one of the most common ways individuals, institutions, and organizations become vulnerable to cyberattacks. Scams targeting account compromise (gaining unauthorized...
Read More

Friendly Fall Reminders

With classes kicking off this week, Northwestern IT’s Information Security Office has important tips to ensure everyone starts the academic year strong and secure....
Read More

Zoom Conferencing

A major part of the adjustment to remote work and school has been the regular use of videoconferencing tools. Zoom is one of the...
Read More

Careers in Cybersecurity

Have you considered a career in Cybersecurity? It is a fast-paced, highly dynamic field with a huge number of specialties to choose from, including...
Read More

Reporting an Incident

Bad guys are very persistent, eventually, anyone can make a mistake. If a phone call from the “Help Desk” doesn’t sound quite right, if...
Read More

Don’t Lose That Device

Did you know you are 100 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling,...
Read More

Bluetooth

Turn off Bluetooth if you are not using it on your computer or device. Not only does this make it more secure, but it...
Read More

Dark Web

The Dark Web is a network of systems connected to the Internet designed to share information securely and anonymously. These capabilities are abused by...
Read More

Major News Events

When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to...
Read More

Beware of What Google Home and Alexa Listen To

https://www.bleepingcomputer.com/news/security/malicious-apps-on-alexa-or-google-home-can-spy-or-steal-passwords/ PSA: Don’t put your Google Home/Alexa near a window from homeautomation
Read More