Cyber Security Awareness Month 2017 Archive

Device Security

Device Security

To ensure your devices are protected from viruses, malware, and vulnerabilities, make sure you apply the latest security and software updates as they become available. Operating System and Software updates address security vulnerabilities and critical issues that need to be resolved, and often increase the speed and efficiency of your device. These updates are not limited to laptops and desktops, they are critical for mobile devices as well. 

There are several examples of security vulnerabilities and their impact.

For more general information on the importance of security updates, please see the articles below:

 

______________________________________________________________________________________________________________________________________




______________________________________________________________________________________________________________________________________

Social Networks

Social Networks

As social media becomes increasingly prevalent in today's society, it is crucial to understand the impacts of what you post online and how it may affect your future.  Social media has become a mechanism for organizations to get a glimpse of who you are outside of the workplace, and your content could be used as grounds for termination of employment or a rescinded a job offer. 

For more information on the importance of thinking before you post, view the articles listed below.

______________________________________________________________________________________________________________________________________




______________________________________________________________________________________________________________________________________

Phishing

Phishing

Phishing is an attempt by malicious actors pretending to be a legitimate enterprise for the purpose of stealing your private information, such as username and passwords, Social Security Numbers, and banking information.  Phishing attacks have become increasingly problematic to enterprises and Universities across the globe, costing organizations $1.6 million in damages on average. 

To learn more about the extensive costs of Phishing attacks, check out these articles:

Additionally, the LSU ITSP team has organized several different resources to help you identify a potential phishing email, methods to report it, and phishing attempts encountered by LSU Community at - http://www.lsu.edu/it_services/its_security/phishatLSU.php

______________________________________________________________________________________________________________________________________




______________________________________________________________________________________________________________________________________

 Identity Theft

 Identity Theft

Identity theft involves an attacker stealing your personal information in order to commit fraud, which in turn can have a lasting negative impact on your credit and finances. Many corporations, government agencies, and Universities have had to face the negative impacts of data breaches resulting in identity theft. Most recently, you may have heard of a significant breach which targeted the credit-reporting agency, Equifax. The attack left nearly 143 million Americans with their personal data compromised, including but not limited to Social Security Numbers, addresses and driver's license numbers.

For more information on types of identity theft, how to report identity theft, and the Equifax breach, click here:

Additionally, the LSU ITSP team has organized several different resources to help you protect your privacy and avoid identity theft. To access the ITSP identity protection site, click here.