October is Cybersecurity Awareness Month and Pitt Information Technology is observing it by hosting three series of activities—providing students, faculty and staff an opportunity to earn $5 in Panther Funds, not to mention hands-on learning to become a seasoned cybercrime detector. Take some time to participate each day through Halloween.
You are here
It’s Cybersecurity Awareness Month—Pitt IT’s favorite time of year. Techies often focus on the high-tech methods hackers use to crack passwords, bypass firewalls, infect a device, and steal people’s data or money. But the truth is that most cybercriminals don’t hack your system. Instead, they hack you. In other words, they trick you into giving them the keys to the castle using social engineering.
It’s finally October! While many people are hyped for Halloween and pumpkin spice lattes, the folks in Pitt IT are jazzed for Cybersecurity Awareness Month. Despite all the advanced tools, security reviews, secure network design, and constant vigilance of Pitt IT to protect University systems, accounts, and computers, the most crucial security safeguard is … YOU! By understanding how hackers work and what to look for when it comes to cybersecurity risks, you can stop hackers before they arrive. Here are 26 terms* you should understand to #BeCyberSmart!
Pitt researchers use their extensive knowledge, boundless curiosity, and innovative techniques to bring new ideas to life. It takes robust technology tools to help investigators collect, store, and analyze the data; document their processes and results; and share and work with collaborators and lab personnel. Pitt IT supports the work of researchers, so they can focus on doing what they do best: making the University of Pittsburgh one of the top research institutions in the world!
Pitt’s Center for Research Computing (CRC) provides researchers with free access to advanced computing hardware and software, along with training and consultation by CRC research faculty. University faculty are able to perform resource-intensive functions, such as simulations; data, image, and text analysis; and genomic sequencing to help give shape to innovative ideas.
For the past 18 months, many campus offices have been empty. Hallways were quiet, office doors were locked, and lights stayed dark. But recently, the familiar hum of a new academic year grew louder, with thousands of students moving into the residence halls and in-person activities resuming.
A new semester brings many things: new members of the Pitt community, a new schedule, and a new year of working on your device. Unfortunately, it also brings new cybersecurity threats, with hackers hoping to wreak havoc with your online identity. But you can stop them in their tracks. Here are some tips for keeping your information, your devices, and yourself safe and secure.
Welcome (back) to campus, Panthers! For all the students who are new to Pitt and all the students who haven’t been on campus in over a year, here’s a Pitt IT 101 crash course on all the computing facilities on campus.
It takes a lot of PCs, servers, storage, and systems to support the University’s teaching, learning, and research mission. But it’s hard to think of all that technology as a perk. It’s Pitt IT’s job to think about the computing infrastructure that is the backbone of so much that happens on our five campuses. But there are other IT benefits that are provided specifically to you.
The fall semester will be here before you know it. Whether you’re a first-year student or coming back for another great year, make move-in less hectic by completing a few key IT tasks before you arrive.