In this section

Thank you for your involvement in Cybersecurity Awareness Month in October 2024! The university is proud to be a champion of this online safety and education initiative. The activities offered by Technology Services throughout the month have now concluded. If you tried the cybersecurity themed puzzles, you can now find the answers to the Double Puzzle and Crossword Puzzle

Provide Feedback

 

2024 Champion Cybersecurity Awareness Month

Register for Learning Opportunities

Information on additional learning and development opportunities for faculty/staff is available on the Human Resources webpage.

Detecting Misinformation

Come learn about misinformation and ways to counter it! Collins librarians will provide an overview of how misinformation functions in the digital age, share strategies for spotting it, and facilitate discussion to help you decide how much you can trust the online information you encounter.

Location: LI-017 in the lower level of Collins Memorial Library 

Times Offered:
Thursday, Oct. 3 at 11 a.m. - Register here to join on Zoom

Essentials for Securing Your Digital Life

Come find out if your cyber hygiene passes the sniff test! In this session, you’ll learn about four key behaviors to stay ahead of cybercriminals. We’ll dive into locking down your logins, keeping your devices fresh, and dodging social engineering scams like a pro. Don’t sweat it - these simple steps will help you secure your digital life!

Location: Virtual on Zoom

Times Offered:
Monday, Oct. 7 at 3 p.m. - Register here
Friday, Oct. 25 at 3 p.m. - Register here

Stop Trying to Be Me! Guarding Your Identity

It’s not a compliment when cybercriminals want to impersonate you. Discover the most common types of identity theft and the telltale warning signs that someone may be trying to steal your identity. Learn how to shut down these imposters with proactive measures and catch identity theft before it escalates.

Location: Virtual on Zoom

Times Offered:
Thursday, Oct. 17 at 1 p.m. - Register here
Monday, Oct. 28 at 2 p.m. - Register here

Other Ways to Get Involved

Switch to an Authenticator App

Not all verification methods for MFA are equally reliable or secure. Have you ever been unable to log in due to poor cellular service? Switch from text message (SMS) or voice call based verification to an authenticator app. For your university account, we recommend setting up MFA with Okta Verify or other authenticator apps such as Authy or Google Authenticator. In addition to functioning without cellular service, these methods do not carry the risk of being intercepted and are more secure.

Need help? Every Tuesday in October (except Oct. 1), from 11:30 a.m. – 1:30 p.m., members of Technology Services will be tabling in the Wheelock Student Center. Drop by for assistance with MFA! 

Dispose of Old Electronics Securely and Sustainably

Mark your calendars for Wednesday, Oct. 30. Technology Services will be offering an e-cycle opportunity for you to drop off any departmental or personal electronics you would like to dispose of. Drop them off to the Tech Center in the lower level of Collins Memorial Library between 9 a.m. - 4 p.m. To ensure data security, all items with data will undergo a secure data destruction process. A list of accepted items can be found on the Green PC website.

Please note the following items are not accepted for recycling:

  • Household appliances (e.g., washers, dryers, other large appliances)
  • Coffee makers
  • Non-working air conditioners
  • Refrigerators and freezer combos
  • Vacuums

Go Phishing

To help you become a pro at detecting phishing scams and stay safe from social engineering, Technology Services will be sending simulated phishing emails. These emails will be designed to resemble actual phishing attempts used by cybercriminals, but will be harmless. See if you can catch the phish! Campus members who report it using the Phish Alert Button will be selected to receive an exclusive sticker, a free drink from DES, or a Logger Store gift voucher. 

Puzzle it Out

Need a break and enjoy word games? See if you can tackle these cybersecurity themed puzzles! (Login to university Google Drive required.)

#SecureOurWorld With Four Easy Practices

double up your security game
Enable multi-factor authentication

Using multi-factor authentication (MFA) adds a layer of security on your digital accounts. Even if cybercriminals manage to guess or steal your password, MFA makes it significantly harder for them to gain access to your accounts. Start enabling MFA on the accounts most important to you such as financial accounts, email, password managers, cloud storage accounts, and social media.

For your university account, consider setting up an additional factor in case one becomes unavailable to you, like if you get a new phone. We also recommend configuring a factor other than SMS or voice call, such as Okta Verify or Google Authenticator.

 

Additional Resources:

running out of password ideas
Use strong passwords and a password manager

Strong passwords are lengthy (16+ characters), random (computer generated or containing multiple unrelated words), and unique (not used on multiple websites). As you begin using unique passwords, remembering them all gets tricky! Consider using a reputable password manager in your personal life to help you create and maintain strong passwords, and streamline your log in experience.

 

Additional Resources:

stop clicking remind me later
Update software

Keep your device regularly updated to prevent attackers from exploiting vulnerabilities in your device's operating system. In addition to your computer and smartphone, don't forget about other internet-connected devices such as wearable technology, smart TVs, smart speakers, and others!

 

Additional Resources:

if it looks phishy it probably is
Recognize and report phishing

Learn how to recognize phishing attempts that might land in your inbox. When you spot it, be a hero and report it

Don't take the bait! Cybercriminals use social engineering to trick you into taking harmful actions. In addition to phishing emails, watch out for social engineering attacks that may come through a phone call, text message, direct messages on social media, fake websites, or some combination. 

 

Additional Resources:

Feedback

We welcome your input and ideas! Please provide feedback using this form: https://forms.gle/5yxs3artsYejVK5p7. All responses will be anonymous unless you choose to provide your name.

Provide Feedback