Articles tagged with: cybersecurity
What App? – Vetting Apps for Your Phone and Tablet
Picture it. Oklahoma, 2025. It’s summer. It’s hot, humid, and the cicadas are deafening. I’m scrolling through emails, trying to stay cool with a tall glass of iced tea and my phone rings. It’s my mother-in-law and she’s got a story to tell. International travel, deadlines closing in, eVisa? The government sanctioned app she had [ Read More ]
Read More
AI and Cybersecurity: Smarter Tech, Bigger Risks
Introduction As artificial intelligence becomes more prevalent in our lives and workflows, it’s not just a neutral tool that can help us be more productive – it’s also an evolving battlefield of attack vs defense. For National Cybersecurity Awareness Month, the question isn’t just “how do we use AI safely?” but also “how might cybercriminals [ Read More ]
Read More
Beyond the Shadows: Understanding and Managing Shadow IT in Modern Workplaces
Overview Shadow IT, the use of unsanctioned technology within organizations, has emerged as a double-edged sword in today’s digital environments: While it can foster innovation and productivity, it also introduces serious risks such as data breaches, compliance violations, and integration challenges. This article explores the concept of Shadow IT, its causes, risks, potential benefits, and [ Read More ]
Read More
Hook, Line and Sinker: Don’t get reeled in by phishing scams!
If an email promises you free gift cards, asks you to verify your account, or insists that your bank will close your account in 24 hours: congratulations, you’ve just been invited on a phishing trip. But unlike real fishing, the only thing getting caught is you. Phishing is one of the most common and effective [ Read More ]
Read More
Multi-Factor Authentication II: A Portable 2-Factor Authentication App
Protecting Your Accounts: The Importance of Two-Factor Authentication and 2FAS One of the difficulties that has arisen as our society grows ever more digital is the need to verify identities. Early applications used simple passwords, then username-password pairs, then increasingly more complex passwords to try and stay secure. This produced several issues, including the need [ Read More ]
Read More
Keep Your Home Computer Running Smoothly: Easy Steps for Updating Windows and Mac
For computers connected to the OSU network, Agriculture IT has you covered when it comes to keeping your office machine up to date. Our IT team handles operating system updates so you don’t have to think about it. But when you are at home working on your personal computer or using an OSU computer off [ Read More ]
Read More
Privacy Risks with Car Rentals
In today’s era of easy car rentals and rapid advancements in automotive technology, modern vehicles are equipped with a range of features designed to enhance user experience. However, many of these features may require access to personal information, which poses significant privacy risks if not managed properly. Key features and Their Privacy Risks What Information [ Read More ]
Read More
Strengthening Security: The Importance of Password and Physical Security in the Digital Age
In the modern information age, safeguarding sensitive information has become more critical than ever. Whether it’s personal data, university data, or even your social media accounts, both password security and physical security are crucial in protecting our valuable resources. Here’s why these two components are essential and how you can enhance them. Password Security: The [ Read More ]
Read More
The Convergence of AI and Cybersecurity
Are Artificial Intelligence (AI) and related technologies going to ultimately help us or harm us? It’s a question being debated across news cycles and behind closed doors on Capital Hill as AI technologies continue to be developed and implemented at an unprecedented rate, with little legislation, controls, or governance. And the market is booming. Goldman [ Read More ]
Read More
Protecting Your Digital Life: Cybersecurity Tips While Traveling
In today’s hyper-connected world, travel often means staying connected to the digital realm. Whether you’re traveling for business or leisure, it’s crucial to prioritize cybersecurity to protect your personal and sensitive information from cyber threats. Here are some cybersecurity tips to keep in mind while you’re on the go: Travel As Light As Possible: Take [ Read More ]
Read More