Articles tagged with: End Users

How to protect your phone or tablet – simple steps for Android and iOS security.

Phones and tablets have gone from being cool gadgets to our partners in crime, helping us keep in touch with our people, hoarding our secrets, and occasionally granting us entry into the mystical realm of work networks and services. They’re like little digital treasure chests of personal data. But, just like we’d lock up our [ Read More ]

Read More

Why is Cybersecurity Awareness Important?

This article delves into the reasons why cybersecurity awareness is not just an option, but is very important for individuals, organizations, and society. Protection of Personal Data According to the U.S. Federal Trade Commission (FTC), identity theft remains one of the top consumer complaints. In 2020, the FTC received 1.4 million fraud reports, with identity [ Read More ]

Read More

OSU Service Account Password Change

Service accounts are generally an OSU email account that is bound to a department or office. These accounts can be used for a variety of things, but many are used for shared calendars or OneDrive folders. This way the account stays with the department if someone was to leave for a different department or OSU [ Read More ]

Read More

National Cybersecurity Awareness Month 2022: Personal Awareness

Cybersecurity Awareness Month is a great time to reflect on your habits and how you interact with technology over the past year. With this, answers to the following questions can help you focus on keeping your online identity and your data safe. Have you connected to any public Wi-Fi networks over the last year? While [ Read More ]

Read More

VPN: Not just for work anymore

As technology evolves and organizations adapt, our workplace environments have changed so that working remotely – outside the organization’s office space – is now more common and acceptable for both the employer and the employee. When you work from your office at the business’ headquarters, you usually have (hopefully!) IT staff and infrastructure who work [ Read More ]

Read More

End of Life (EOL) Are You Safe?

We all know about our software always wanting to install updates. Windows, Office, Adobe, Zoom, and just about any other software we install. At some point your software wants you to install, buy, download, or do an upgrade to a new version. This usually means the previous software versions will no longer be supported, End of Life (EOL). Now, [ Read More ]

Read More

Zoom: troubleshooting speakers, microphones, and Cameras.

Hosting zoom meetings can be a challenge when working with a group or even by yourself on a computer that has more than one microphone, camera, or set of speakers. However, programmers at Zoom have created an easy way to easily change each of these sources. In the following list, I will show how you [ Read More ]

Read More

Securing your Zoom Session

Zoom has experienced a surge in the number of people that are using its video conferencing software in the past few weeks. While this surge has been great for their business, it has also brought out some security issues with their standard set of options. Zoom-Bombing is one particularly annoying security issue that Zoom users [ Read More ]

Read More

Preventing Zoom-Bombing

What is Zoom-bombing? Zoom-bombing is a new issue with Zoom meetings where gate crashers will join meetings already in progress to try and disrupt the proceedings by sharing viruses, disturbing pornographic images, and/or violent imagery. Most of the time, this happens when a meeting link is shared through public communication sources such as social media, [ Read More ]

Read More

Cleaning and sanitizing your desktop workspace.

Cleaning your computer can be a hassle. However, a computer keyboard can easily be one of the dirtiest items in your home. Especially if you occasionally eat at your computer or forget to wash your hands before using your computer. With the health risks we are currently facing, it is a good idea to regularly [ Read More ]

Read More