Information Technology A to Z Index IT Service Support Request

Safe Computing Support

Apps and Software Security

Apps and software are what run on our PCs, phones, and other mobile devices.  They allow us to do our work, complete school assignments, access entertainment and connect with the world.  They are also easy ways for criminals to gain access to your devices and the information stored on them.

Protect Your Privacy

Your personal information is as valuable as money.  As such, you should value and protect it.  Your PCs and other devices connect to the world but are loaded with personal information about you—contact, photos, videos, locations, financial data, etc.

Viruses & Malware

Viruses and malware is software designed to gain access to your computer.  There are many forms including spyware that records your activity and sends to a hacker; viruses that damage and delete your files; and ransomware that locks your computer and files until you pay money (usually in the form of bitcoins) to recover the system—if you’re lucky.

Network Security

Most devices today need an internet connection to be useful but anyone can set up a free Wi-Fi network and fool you into handing over your personal data.

Best Practices

Know or verify who owns Wi-Fi or wired networks before you connect

Social Engineering

Social engineering is the art of manipulating people into giving up confidential information or access to restricted areas. Their attacks can come through emails, text messages, over the phone, via social media, in person, and more.  Someone launching a social engineering attack won’t ask one person for the entire information they need.  Instead, they will gather a lot of seemingly harmless information from many sources and use it to look legitimate.

Secure Your Data

Everyone is responsible for sensitive data—from banking information to student grades.  We have our personal sensitive data and university sensitive data. Unlocked workstations, unencrypted data on mobile devices, and unsecured wireless networks make data vulnerable to loss, identity theft, and sensitive data breaches.

Social Media Security

Social media is here to stay—we connect with family and friends, brands, industry leaders, politicians, and even celebrities.  But social networks make it easy for criminals to find out information about you and even infect your computer with viruses and malware.

Compromised Accounts

A compromised EKU account is one accessed by a person not authorized to use the account.  Criminals and hackers target EKU users to gain:

Physical Security

Ensure the physical security of your electronics will keep your private information and sensitive data out of danger.

Pages