KJB136's blog | Information Technology | University of Pittsburgh
!

You are here

KJB136's blog

Gen Z Tech Trends

Gen Z really are the Zoomer generation, given how much time they’ve spent in online classes and events in the last year and a half! This generation is tech savvy, self-motivated, and always connected. While you might not share the habits and preferences of today’s students, it’s important to understand how their digital habits shape the way they interact with you.

Perfect Your Password Protection

Passwords – you can’t escape them. Logging into your computer? Enter your password. Checking your email? Enter your password. Online banking? Enter your password. Passwords are such an integral part of online life, it’s easy to forget how important they actually are for protecting your digital footprint. Here are some tips for becoming a password pro.

Hacking the Human

It’s Cybersecurity Awareness Month—Pitt IT’s favorite time of year. Techies often focus on the high-tech methods hackers use to crack passwords, bypass firewalls, infect a device, and steal people’s data or money. But the truth is that most cybercriminals don’t hack your system. Instead, they hack you. In other words, they trick you into giving them the keys to the castle using social engineering.

The A–Z of Cybersecurity

It’s finally October! While many people are hyped for Halloween and pumpkin spice lattes, the folks in Pitt IT are jazzed for Cybersecurity Awareness Month. Despite all the advanced tools, security reviews, secure network design, and constant vigilance of Pitt IT to protect University systems, accounts, and computers, the most crucial security safeguard is … YOU! By understanding how hackers work and what to look for when it comes to cybersecurity risks, you can stop hackers before they arrive. Here are 26 terms* you should understand to #BeCyberSmart!

IT Tools for Researchers

Pitt researchers use their extensive knowledge, boundless curiosity, and innovative techniques to bring new ideas to life. It takes robust technology tools to help investigators collect, store, and analyze the data; document their processes and results; and share and work with collaborators and lab personnel. Pitt IT supports the work of researchers, so they can focus on doing what they do best: making the University of Pittsburgh one of the top research institutions in the world!

Visualizing Data for Better Decision-Making at the CRC

Pitt’s Center for Research Computing (CRC) provides researchers with free access to advanced computing hardware and software, along with training and consultation by CRC research faculty. University faculty are able to perform resource-intensive functions, such as simulations; data, image, and text analysis; and genomic sequencing to help give shape to innovative ideas.

Protect Your Tech, Protect Yourself: Safe Computing at Pitt

A new semester brings many things: new members of the Pitt community, a new schedule, and a new year of working on your device. Unfortunately, it also brings new cybersecurity threats, with hackers hoping to wreak havoc with your online identity. But you can stop them in their tracks. Here are some tips for keeping your information, your devices, and yourself safe and secure.