Articles tagged with: Information
Zoom AI Companion
Zoom recently introduced AI features that could enhance your Zoom Meetings and provide users with more personalized experiences. OSU Enterprise IT has announced that some of these features will be available to all those who login to Zoom with their OSU accounts and are available now. AI-Powered Meeting Assistance Zoom’s AI assistant can summarize meetings, [ Read More ]
Read More
Traveling Abroad? Essential Tech Tips for the Savvy Traveler in 2024
As you embark on international adventures, ensuring smooth technological connections and security is paramount. Here is a comprehensive guide to help you navigate the digital landscape of your foreign destination with ease and confidence. Considerations covered in this article: VPN: Your Global Gateway When traveling, a Virtual Private Network (VPN) becomes your indispensable digital companion. [ Read More ]
Read More
Farewell, Calibri: Introducing Aptos
Three years ago, Microsoft announced its intention to move away from using Calibri as the default font for Word, Excel, PowerPoint, Outlook, and other apps in the suite formerly known as Microsoft Office, now known as Microsoft Office 365. After evaluating five candidate fonts, Aptos, formerly known as Bierstadt, has emerged as the winner. What Is Aptos? Why the [ Read More ]
Read More
Multifactor Authentication and why it is important
Many people are seeing more and more services requiring or suggesting the use of multifactor authentication (MFA) for accessing online systems. MFA is a login process that requires multiple methods of authentication to verify a user’s identity. It combines two or more independent credentials to verify a login. The first credential is based on something [ Read More ]
Read More
Types of Phishing Attacks
A cyberscammer will use a variety of tactics and ploys to disguise themself as trustworthy in an effort to gain access to information. As technologies evolve, so does the scammer’s ability to influence your decision about their trustworthiness. Phishing is a common attack method used by scammers. There are different types of phishing attacks: Email [ Read More ]
Read More
Why is Cybersecurity Awareness Important?
This article delves into the reasons why cybersecurity awareness is not just an option, but is very important for individuals, organizations, and society. Protection of Personal Data According to the U.S. Federal Trade Commission (FTC), identity theft remains one of the top consumer complaints. In 2020, the FTC received 1.4 million fraud reports, with identity [ Read More ]
Read More
OSU Service Account Password Change
Service accounts are generally an OSU email account that is bound to a department or office. These accounts can be used for a variety of things, but many are used for shared calendars or OneDrive folders. This way the account stays with the department if someone was to leave for a different department or OSU [ Read More ]
Read More
Multi-factor Authentication
Multi-factor authentication (MFA) is sometimes referred to as two-factor authentication or 2FA. This is a security feature that requires you to present two types of credentials when logging in. These credentials can be something you know (a password for example), something you have (like a smartphone), or something you are (for example a fingerprint or [ Read More ]
Read More
National Cybersecurity Awareness Month 2022: Personal Awareness
Cybersecurity Awareness Month is a great time to reflect on your habits and how you interact with technology over the past year. With this, answers to the following questions can help you focus on keeping your online identity and your data safe. Have you connected to any public Wi-Fi networks over the last year? While [ Read More ]
Read More
National Cybersecurity Awareness Month 2022: Physical Security
National Cybersecurity Awareness Month 2022 provides an opportunity to review a basic yet very important security measure: physical security of our technology and computers. Limiting and preventing physical access to the technology is key to preventing unauthorized access to our computers and data, whether it is personal or university owned. Some offices have barriers, such [ Read More ]
Read More