Protect Against Risks
Protect your computer against these security risks.
Protect your mobile devices against loss or theft.
Protecting University computers and sensitive information is the responsibility of every member of the University community.
Hackers take advantage of vulnerabilities in computer software programs and operating systems.
Email attachments can contain destructive viruses, Trojan horses, or spyware.
Identity theft is the deliberate assumption of another individual’s identity, usually to gain access to a person's finances or to frame that person for a crime.
File sharing programs allow sharing of copyrighted music, movies, and software, often without the knowledge or consent of the user.
Sensitive information can be improperly disclosed if the proper data removal steps are not taken.
Phishing is a kind of identity theft using fake emails or Web sites.
Sensitive documents and computer files can be vulnerable to a break-in or “walk-by” attack.
"Social engineers" manipulate people into divulging confidential information, such as passwords and IDs.
Protect your reputation and your privacy when using social networking sites.
Spam is unwanted "junk" email.
Telnet and FTP transmit passwords and data across the Internet unencrypted.
Wireless transmissions can be intercepted to compromise confidential information.