Articles tagged with: Best Practices

Traveling Abroad? Essential Tech Tips for the Savvy Traveler in 2024

As you embark on international adventures, ensuring smooth technological connections and security is paramount. Here is a comprehensive guide to help you navigate the digital landscape of your foreign destination with ease and confidence.  Considerations covered in this article: VPN: Your Global Gateway When traveling, a Virtual Private Network (VPN) becomes your indispensable digital companion. [ Read More ]

Read More

How to Inventory Your Technology for Recovery & Claims 

Severe weather, fires, theft, and misplaced items while traveling are already high-stress situations. You may find yourself needing to submit an insurance claim or police report for your phone, laptop, or tablet during one of these situations. You start to make your report and get asked the make, model, and serial number of your device. [ Read More ]

Read More

Strengthening Security: The Importance of Password and Physical Security in the Digital Age

In the modern information age, safeguarding sensitive information has become more critical than ever. Whether it’s personal data, university data, or even your social media accounts, both password security and physical security are crucial in protecting our valuable resources. Here’s why these two components are essential and how you can enhance them. Password Security: The [ Read More ]

Read More

Service Accounts and Their Uses

What is a Service Account? At Oklahoma State University, employees can request the creation of an additional email address that is separate from their personal OSU email. This email address can be used for communication, social media, or to create accounts for online services like Google, Apple, and others. Service Accounts also have access to [ Read More ]

Read More

Types of Phishing Attacks

A cyberscammer will use a variety of tactics and ploys to disguise themself as trustworthy in an effort to gain access to information. As technologies evolve, so does the scammer’s ability to influence your decision about their trustworthiness. Phishing is a common attack method used by scammers. There are different types of phishing attacks: Email [ Read More ]

Read More

Why is Cybersecurity Awareness Important?

This article delves into the reasons why cybersecurity awareness is not just an option, but is very important for individuals, organizations, and society. Protection of Personal Data According to the U.S. Federal Trade Commission (FTC), identity theft remains one of the top consumer complaints. In 2020, the FTC received 1.4 million fraud reports, with identity [ Read More ]

Read More

OSU Service Account Password Change

Service accounts are generally an OSU email account that is bound to a department or office. These accounts can be used for a variety of things, but many are used for shared calendars or OneDrive folders. This way the account stays with the department if someone was to leave for a different department or OSU [ Read More ]

Read More

Computer Viruses and Malware: Cybersecurity Awareness Month 2022

Most people who use computers have heard the terms “malware” and “computer viruses”, but what are they? Malware and computer viruses are usually used synonymously but while it’s true that all viruses are malware, not all malware is a computer virus. Malware, short for malicious software, refers to software that is made to be malicious. [ Read More ]

Read More

Multi-factor Authentication

Multi-factor authentication (MFA) is sometimes referred to as two-factor authentication or 2FA. This is a security feature that requires you to present two types of credentials when logging in. These credentials can be something you know (a password for example), something you have (like a smartphone), or something you are (for example a fingerprint or [ Read More ]

Read More

National Cybersecurity Awareness Month 2022: Personal Awareness

Cybersecurity Awareness Month is a great time to reflect on your habits and how you interact with technology over the past year. With this, answers to the following questions can help you focus on keeping your online identity and your data safe. Have you connected to any public Wi-Fi networks over the last year? While [ Read More ]

Read More