Articles tagged with: cybersecurity
Multi-Factor Authentication II: A Portable 2-Factor Authentication App
Protecting Your Accounts: The Importance of Two-Factor Authentication and 2FAS One of the difficulties that has arisen as our society grows ever more digital is the need to verify identities. Early applications used simple passwords, then username-password pairs, then increasingly more complex passwords to try and stay secure. This produced several issues, including the need [ Read More ]
Read More
Keep Your Home Computer Running Smoothly: Easy Steps for Updating Windows and Mac
For computers connected to the OSU network, Agriculture IT has you covered when it comes to keeping your office machine up to date. Our IT team handles operating system updates so you don’t have to think about it. But when you are at home working on your personal computer or using an OSU computer off [ Read More ]
Read More
Privacy Risks with Car Rentals
In today’s era of easy car rentals and rapid advancements in automotive technology, modern vehicles are equipped with a range of features designed to enhance user experience. However, many of these features may require access to personal information, which poses significant privacy risks if not managed properly. Key features and Their Privacy Risks What Information [ Read More ]
Read More
Strengthening Security: The Importance of Password and Physical Security in the Digital Age
In the modern information age, safeguarding sensitive information has become more critical than ever. Whether it’s personal data, university data, or even your social media accounts, both password security and physical security are crucial in protecting our valuable resources. Here’s why these two components are essential and how you can enhance them. Password Security: The [ Read More ]
Read More
The Convergence of AI and Cybersecurity
Are Artificial Intelligence (AI) and related technologies going to ultimately help us or harm us? It’s a question being debated across news cycles and behind closed doors on Capital Hill as AI technologies continue to be developed and implemented at an unprecedented rate, with little legislation, controls, or governance. And the market is booming. Goldman [ Read More ]
Read More
Protecting Your Digital Life: Cybersecurity Tips While Traveling
In today’s hyper-connected world, travel often means staying connected to the digital realm. Whether you’re traveling for business or leisure, it’s crucial to prioritize cybersecurity to protect your personal and sensitive information from cyber threats. Here are some cybersecurity tips to keep in mind while you’re on the go: Travel As Light As Possible: Take [ Read More ]
Read More
Computer Viruses and Malware: Cybersecurity Awareness Month 2022
Most people who use computers have heard the terms “malware” and “computer viruses”, but what are they? Malware and computer viruses are usually used synonymously but while it’s true that all viruses are malware, not all malware is a computer virus. Malware, short for malicious software, refers to software that is made to be malicious. [ Read More ]
Read More
End of Life (EOL) Are You Safe?
We all know about our software always wanting to install updates. Windows, Office, Adobe, Zoom, and just about any other software we install. At some point your software wants you to install, buy, download, or do an upgrade to a new version. This usually means the previous software versions will no longer be supported, End of Life (EOL). Now, [ Read More ]
Read More
Cybersecurity 2020: Safeguard Your Data
Why should you care? How would you feel if you walked into your office tomorrow and your computer was gone? Does your physical and emotional state worsen if you realize all your data that you accumulated over the years was suddenly ripped out of your hands? Even worse, what if the data now in the [ Read More ]
Read More
Cybersecurity 2020: Phishing
The Federal Trade Commission explains that phishing “is a type of online scam that targets consumers by sending them an e-mail that appears to be from a well-known source.” The message attempts to get you to share valuable personal and sensitive information such as login names and passwords, bank account information or a social security number. Tips to spot a phishing [ Read More ]
Read More