KJB136's blog | Information Technology | University of Pittsburgh

You are here

KJB136's blog

4 Tech New Year’s Resolutions

Happy New Year, Panthers! Well, happy belated new year. Even though we’re about three weeks into 2022, it’s not too late to set goals for the rest of the year. Here are our top four tech-related resolutions.

1. Prioritize Your Passwords

Secure passwords are probably the easiest and most effective way to stay cybersafe in the new year (and beyond). Make sure your passwords include a mix of upper- and lower-case letters, numbers, and special characters. Also, no repeats—use a different password for every site or service you use.

Super Safe Winter Vacation

It’s that time of year again, Panthers. The fall semester is coming to a close, and winter break is on the horizon! Students will be off from Dec. 19–Jan. 9, and the Winter break for faculty and staff has been expanded to encompass Dec. 20 – Jan. 3. While you’re off relaxing and celebrating, make sure you’re your tech, and your data stays secure. Here are some tips to help you have a cyber-safe winter break.

Do Duo Better

While most of us appreciate the added protection offered by multifactor authentication, having to verify multiple times a day is not exactly something most of us look forward to. The good news is that with a little know-how, it doesn’t have to be annoying. Here are Pitt IT’s top 5 tips for making two-factor authentication a breeze.

Digital Accessibility for Superior Performance

To create a truly vibrant learning, research, and teaching environment, the University needs the full participation, contribution, and engagement of every person in our community. That means everyone must be able to access all our resources and programs, including those that are online.

People often think of physical services when they hear the term accessibility—e.g., wheelchair ramps, automatic doors, ASL interpreters, or braille textbooks. But when it comes to the Internet, accessibility looks a little different.

Securing Data Privacy

From the moment a person submits an employment or admissions application until the day they leave the University, Pitt collects a wide array of data about the people in our community. This information is necessary to track academic progress, run payroll and benefits, apply financial aid, enable smart IDs, grant system access, and nearly every other facet of daily operations.

Gen Z Tech Trends

Gen Z really are the Zoomer generation, given how much time they’ve spent in online classes and events in the last year and a half! This generation is tech savvy, self-motivated, and always connected. While you might not share the habits and preferences of today’s students, it’s important to understand how their digital habits shape the way they interact with you.

Perfect Your Password Protection

Passwords – you can’t escape them. Logging into your computer? Enter your password. Checking your email? Enter your password. Online banking? Enter your password. Passwords are such an integral part of online life, it’s easy to forget how important they actually are for protecting your digital footprint. Here are some tips for becoming a password pro.

Hacking the Human

It’s Cybersecurity Awareness Month—Pitt IT’s favorite time of year. Techies often focus on the high-tech methods hackers use to crack passwords, bypass firewalls, infect a device, and steal people’s data or money. But the truth is that most cybercriminals don’t hack your system. Instead, they hack you. In other words, they trick you into giving them the keys to the castle using social engineering.

The A–Z of Cybersecurity

It’s finally October! While many people are hyped for Halloween and pumpkin spice lattes, the folks in Pitt IT are jazzed for Cybersecurity Awareness Month. Despite all the advanced tools, security reviews, secure network design, and constant vigilance of Pitt IT to protect University systems, accounts, and computers, the most crucial security safeguard is … YOU! By understanding how hackers work and what to look for when it comes to cybersecurity risks, you can stop hackers before they arrive. Here are 26 terms* you should understand to #BeCyberSmart!