Articles tagged with: Best Practices

OSU Service Account Password Change

Service accounts are generally an OSU email account that is bound to a department or office. These accounts can be used for a variety of things, but many are used for shared calendars or OneDrive folders. This way the account stays with the department if someone was to leave for a different department or OSU [ Read More ]

Read More

Computer Viruses and Malware: Cybersecurity Awareness Month 2022

Most people who use computers have heard the terms “malware” and “computer viruses”, but what are they? Malware and computer viruses are usually used synonymously but while it’s true that all viruses are malware, not all malware is a computer virus. Malware, short for malicious software, refers to software that is made to be malicious. [ Read More ]

Read More

Multi-factor Authentication

Multi-factor authentication (MFA) is sometimes referred to as two-factor authentication or 2FA. This is a security feature that requires you to present two types of credentials when logging in. These credentials can be something you know (a password for example), something you have (like a smartphone), or something you are (for example a fingerprint or [ Read More ]

Read More

National Cybersecurity Awareness Month 2022: Personal Awareness

Cybersecurity Awareness Month is a great time to reflect on your habits and how you interact with technology over the past year. With this, answers to the following questions can help you focus on keeping your online identity and your data safe. Have you connected to any public Wi-Fi networks over the last year? While [ Read More ]

Read More

National Cybersecurity Awareness Month 2022: Physical Security

National Cybersecurity Awareness Month 2022 provides an opportunity to review a basic yet very important security measure: physical security of our technology and computers. Limiting and preventing physical access to the technology is key to preventing unauthorized access to our computers and data, whether it is personal or university owned. Some offices have barriers, such [ Read More ]

Read More

Using the Accessibility Checker in Microsoft Office 365 Apps

Whether you are creating content for the public or making an internal document for review, making that content accessible is one of the best things you can do for its readability. Accessible documents are generally easier to read, plus you have the added advantage of creating content that most people, including those with disabilities, will [ Read More ]

Read More

QR Codes: What are they, what are they good for, and how do you use them?

Even if you do not use QR codes on a regular basis, you have probably seen one over the past few years. Once considered a dead technology, QR codes made a huge comeback during the Covid pandemic. QR codes are square images that allow a smartphone or other device with a camera to open a [ Read More ]

Read More

Password Safety

Passwords are keys to your online castle(s) such as: employer’s online resources, bank account, social media accounts, shopping sites, health records, and much more. Password safety is not something many people think about on a daily basis but passwords help keep your accounts secure and your digital identity safe. In this article, I explore best [ Read More ]

Read More

VPN: Not just for work anymore

As technology evolves and organizations adapt, our workplace environments have changed so that working remotely – outside the organization’s office space – is now more common and acceptable for both the employer and the employee. When you work from your office at the business’ headquarters, you usually have (hopefully!) IT staff and infrastructure who work [ Read More ]

Read More

Don’t Be Held Captive to Ransomware

“$5.9M ransomware attack on major agriculture group poses risk to US grain, pork, chicken supply” Fox Business Sept. 21, 2021 What is Ransomware? Ransomware is a type of malicious attack where attackers encrypt a victim’s data. Ransom is then demanded in exchange for decryption. Hackers often target and threaten to sell or leak sensitive data [ Read More ]

Read More