FAQ
It’s good practice to use phrases as passwords, and to mix in different symbols and numbers as well. ILove!ceCr3am would be a good passphrase/password but very hard for an attacker to guess. Ensure your passwords are strong, and avoid using the same password for all your online accounts.
Tailgating is a fun way to support your favorite team, but did you know it’s also a term for cyber criminals who follow employees into restricted areas? Always check for proper name badges & never let someone you don’t know into areas with sensitive information.
In the hustle and bustle of our daily lives, it can be easy to mindlessly click on emails or links without fear of the repercussions. Don’t become a victim of phishing attempts! Remember to use caution when opening emails and keep good cyber security practices top of mind.
Mobile technology has revolutionized how we communicate, make purchases & pay bills. However, mobile devices are also subject to security breaches. Check out this video & learn how to best protect yourself when it comes to using your mobile device.
There are a number of methods you can use to practice email safety. Email encryption, hovering over links, and being wary of attachments are all good ways to identify potential cybercrime.
Be cautious of clicking links or downloading attachments from someone, even if you know them. When in doubt, delete.
Software programs perform certain tasks and functions. The programs were tested repeatedly but certain sequences of events that the developers never expected (and thus not tested) can allow the software to get into a state where something is now broken.
Switching the device off and on, will reload and reset the software and generally put all settings back to its original, stable state (the state that most testing was done in) and therefore will work again. We don’t understand it either but it’s worth a try and could potentially save you time and money.