Protect Against Risks

Protect your computer against these security risks.

Lost or Stolen Laptops and Mobile Devices >

Protect your mobile devices against loss or theft.

Disclosure of Sensitive Information >

Protecting University computers and sensitive information is the responsibility of every member of the University community.

Hackers >

Hackers take advantage of vulnerabilities in computer software programs and operating systems.

Harmful Email and Software >

Email attachments can contain destructive viruses, Trojan horses, or spyware.

Identity Theft >

Identity theft is the deliberate assumption of another individual’s identity, usually to gain access to a person's finances or to frame that person for a crime.

Illegal File Sharing >

File sharing programs allow sharing of copyrighted music, movies, and software, often without the knowledge or consent of the user.

Improper Disposal of Computer Media >

Sensitive information can be improperly disclosed if the proper data removal steps are not taken.

Phishing Scams >

Phishing is a kind of identity theft using fake emails or Web sites.

Physical Security Breaches >

Sensitive documents and computer files can be vulnerable to a break-in or “walk-by” attack.

Social Engineering >

"Social engineers" manipulate people into divulging confidential information, such as passwords and IDs.

Social Networking >

Protect your reputation and your privacy when using social networking sites.

Spam >

Spam is unwanted "junk" email.

Telnet & FTP >

Telnet and FTP transmit passwords and data across the Internet unencrypted.

Wireless Intercept & "Wiphishing" >

Wireless transmissions can be intercepted to compromise confidential information.

Get Help