News from IT that isn't just for geeks

Archive for the ‘Security’ Category

What is eduroam?

Posted on: March 24th, 2015 by Mike Hall

Information about the eduroam network implementation at the University of Mississippi

Tech Support Call Scam Leads to Malware & Financial Loss

Posted on: July 27th, 2014 by DAVID DREWREY

This is being redistributed at the request of Mississippi Department of Information Technology Services. The original distribution date was October 30, 2013. Recent occurrences are being reported. The Risk: Malicious actors use call centers to cold call victims in an attempt to gain access to the victim’s computer, install malware, steal personally identifiable information (PII), and […]

Using the Hovering Technique to Identify Phishing Attacks

Posted on: April 3rd, 2014 by Deetra Wiley

Have you ever received an email requesting your personal information or encouraging you to click on a link?  If so, such email could be a phishing attack – a criminally fraudulent attempt to trick, mislead, or persuade you into disclosing your personal information. Phishing may be in the form of a URL, pop-up, text message, […]

Mobile Devices: Safety & Privacy Considerations

Posted on: August 21st, 2013 by Parishweta Bhatt

With the proliferation of mobile devices in our lives and the trend of Bring Your Own Device (BYOD) on campuses, teachers and students need to be more aware of the safety and privacy concerns related to mobile devices. Users are three times more likely to give out sensitive information on a mobile device and fall […]

Protect Your UM Passwords!

Posted on: April 30th, 2013 by DAVID DREWREY

The University email system has been inundated lately with phishing emails. These take various forms and purport to come from both people and groups you know. This illuminates one key point the IT security awareness presentation emphasizes, that the “From” part of an email message is easily forged by criminals to lead you into believing a message comes from a legitimate source.

Laptop Theft: Anything But Uncommon

Posted on: April 4th, 2013 by Jared Senseman

According to University Police, 17 laptops have been reported stolen on the Ole Miss campus since August 2012. It’s important to keep in mind that this number doesn’t reflect stolen smartphones or tablets, only laptops. With technology doubling every 2 years, there are multiple ways to keep yourself, and your mobile devices, protected. The best […]

Online UM Security Awareness Training

Posted on: September 11th, 2012 by Deetra Wiley

Since 2005, select University employees have been required to participate in security awareness training.  In the past, these required sessions have taken place in a classroom/lecture format.  As of September 17, 2012, the University has partnered with the SANS Institute to offer online security awareness training.  The online training modules are organized to train specific […]

How to Protect Your Passwords

Posted on: August 27th, 2012 by prasad

With increasing use of the Internet in this digital world, it is very important that you secure your information with a strong password.  You have heard that you should always use a password that is complex and hard to guess or crack.  So, what constitutes a strong password?  The following are few guidelines or “things […]

Easy-to-Use Data Protection with Hardware Encryption Devices

Posted on: April 13th, 2012 by DAVID DREWREY

Encryption is a technique to protect data by making it unintelligible to unauthorized users.  Historically, using encryption techniques to protect files has been difficult.  The process frequently requires the assistance of an IT expert. Times have changed.  Over the last few months IT staff members have been testing the latest hardware encryption devices that provide […]

Cloud Storage and Sensitive Data

Posted on: July 25th, 2011 by DAVID DREWREY

Effective July 1, 2011, Mississippi has a data breach notification law, House Bill 583. This law defines what data is considered to be sensitive (confidential), what constitutes a breach under this law, and the process that must be followed in the event sensitive information is “leaked” in a data breach. In addition to the state […]