Skip to main content

Blog

Protecting Data Saves Lives

In the News: We live in an age where nearly everything is digital. Cybersecurity is not (nor has it ever only been) just about...
Read More

Friendly Fall Reminders

With classes kicking off this week, Northwestern IT’s Information Security Office has important tips to ensure everyone starts the academic year strong and secure....
Read More

Scams of the Summer

This summer saw a global spike in certain email phishing scams and other scams. The Northwestern Information Security team keeps a running list of...
Read More

Anatomy of the Spear Phish

On our Radar Spear phishing is a targeted form of phishing. Rather than throwing out a net of deception and hoping that someone gets...
Read More

Connect Carefully & Confidently: Top Five Tips to Secure Your Home Network

As many of us continue to learn and work remotely, practicing safe and easy steps to keep our home internet connections secure remains of...
Read More

Protect Yourself from Ransomware

In the News: GPS giant, Garmin was recently the victim of a ransomware attack that impacted their online services, mobile application, support center, and...
Read More

Beware Social Engineering Tricks: Know the Signs and Methods

In the News: Last week, several prominent and verified Twitter accounts, including Bill Gates, Elon Musk, Barack Obama, and Kanye West, were hijacked by...
Read More

Protect Your Credentials With Password Best Practices

In the News: Infosecurity magazine recently shared an article about London-based, digital risk protection agency, Digital Shadows’ new research claiming that 15 billion user...
Read More

Stolen Identities used for Fraudulent Unemployment Claims

In the News: Identity thieves are taking advantage of the current climate by obtaining people’s personally identifiable information (PII) and  filing fraudulent unemployment claims...
Read More

“Quick Request” Scam

In the News: Gift card scammers continue to target victims through email, often with subject lines such as “Quick Request” or similar subjects. The...
Read More