Information Services > Security > Protect Yourself

Protect Yourself

​Our computers help us stay connected to the virtual world. We use them for financial transactions, connecting through email, social networking, and so much more. We rely heavily on our computers to provide these services, but we sometimes overlook their security. Since our computers have such a critical role in our lives, it is important to improve and maintain their security to help keep our information safe.

​​​​Copyright Infringement

Information Security acts as a steward for the university when responding to reports of copyright infringement. As a team dedicated to maintaining the integrity and survivability of the university's network, we will act on each notice and investigate each incident to validate reports.

Encryption

Information Security acts as a steward for the university when responding to reports of copyright infringement. As a team dedicated to maintaining the integrity and survivability of the university's network, we will act on each notice and investigate each incident to validate reports.

How to Choose a Strong Password

Information Security acts as a steward for the university when responding to reports of copyright infringement. As a team dedicated to maintaining the integrity and survivability of the university's network, we will act on each notice and investigate each incident to validate reports.

How to Update your Browser

Information Security acts as a steward for the university when responding to reports of copyright infringement. As a team dedicated to maintaining the integrity and survivability of the university's network, we will act on each notice and investigate each incident to validate reports.

Personal Computer Security

Information Security acts as a steward for the university when responding to reports of copyright infringement. As a team dedicated to maintaining the integrity and survivability of the university's network, we will act on each notice and investigate each incident to validate reports.

Phishing Emails

Information Security acts as a steward for the university when responding to reports of copyright infringement. As a team dedicated to maintaining the integrity and survivability of the university's network, we will act on each notice and investigate each incident to validate reports.

Responding to Threats and Harrassment

Internet communication allows fast and inexpensive communication on a global scale. Electronic mail is taken for granted as a means to send messages within seconds to friends, family, and associates. With this ability also comes a certain level of anonymity that the Internet provides for those unaware on how to track communication.

Tablet Security

Whether you are a home or business user, it is important to protect your data on the device, especially if using it for sensitive business purposes. There are things you can do to reduce the risks associated with using portable devices.

Watch out for Sponsored Links

Sponsored links are search results that appear at the top of the list. These links can be dangerous because the link may point to a site that contains malware, spyware, or adware -- not to the user's intended destination.

What to do if you have been hacked

It is very difficult for even skilled experts to determine if a compromise has taken place. Computer systems and applications have grown extremely complex, and audit information can sometimes overwhelm even the most discriminating analyst. If you have reason to believe you may have been hacked, seek immediate assistance.