What is an operating system? An operating system (OS) is the main program on a computer. It performs a variety of functions, including determining what types of software you can. read more…
it support
Understanding Anti-Virus Software
What does anti-virus software do? Although details may vary between packages, anti-virus software scans files or your computer’s memory for certain patterns that may indicate the presence of malicious software. read more…
Recognizing Fake Antiviruses
What is fake antivirus? Fake antivirus is malicious software (malware) designed to steal information from unsuspecting users by mimicking legitimate security software. The malware makes numerous system modifications making it. read more…
Protecting Portable Devices: Data Security
Why do you need another layer of protection? Although there are ways to physically protect your laptop, PDA, or other portable device (see Protecting Portable Devices: Physical Security for more information), there. read more…
Protecting Portable Devices: Physical Security
What is at risk? Only you can determine what is actually at risk. If a thief steals your laptop or mobile device, the most obvious loss is the machine itself.. read more…
Using Caution with Email Attachments
Why can email attachments be dangerous? Some characteristics that make email attachments convenient and popular also make them a common tool for attackers: Email is easily circulated – Forwarding email is. read more…
Benefits of BCC
What is BCC? BCC, which stands for blind carbon copy, allows you to hide recipients in email messages. Addresses in the To: field and the CC: (carbon copy) field appear in messages, but users. read more…
Good Security Habits
How can I minimize the access others have to my information? It may be easy to identify people who could gain physical access to your devices—family members, roommates, coworkers, people. read more…
Using Caution with USB Drives
What security risks are associated with USB drives? USB drives, sometimes known as thumb drives, are small, readily available, inexpensive, and portable, so they are popular for storing and transporting. read more…
International Mobile Safety Tips
The guidelines below provide core principles and recommendations for more secure use of digital devices and the Internet. Keep software updated. Running the most recent versions of your mobile operating. read more…
Protecting Your Privacy
How do you know if your privacy is being protected? Privacy policy – Before submitting your name, email address, or other personal information on a website, look for the site’s privacy. read more…
Avoiding Social Engineering and Phishing Attacks
What is a social engineering attack? In a social engineering attack, an attacker uses human interaction (social skills) to obtain or compromise information about an organization or its computer systems. An. read more…
Before You Connect a New Computer to the Internet
Why is computer security important? Because computers play such critical roles in our lives, and because we input and view so much personally identifiable information (PII) on them, it’s imperative. read more…
What is Cybersecurity?
What is cybersecurity? Cybersecurity is the art of protecting networks, devices, and data from unauthorized access or criminal use and the practice of ensuring confidentiality, integrity, and availability of information.. read more…
Javascript not detected. Javascript required for this site to function. Please enable it in your browser settings and refresh this page.