Information Security
Information on how to protect your computer and data from unauthorized access or use.
-
Many of our upcoming in-person events have been canceled or postponed. In the coming weeks you may be rescheduling these events as online trainings and workshops. But perhaps you have wondered whether it’s appropriate to post a link to a Zoom meeting on a public calendar. And perhaps you’ve been scared to hold online meetings […]
-
Update as of 3/30/2020 As of March 26th the screen sharing settings within your Zoom account have automatically defaulted to “Only Host.” This setting gives hosts sole permission to share content within their meetings by default. This effectively ends the ZoomBombing threat. If you’d like to give participants screen sharing permission, simply click the arrow to the […]
-
In this guide, you will learn: 1) What Malware is and what it can do, 2) How to detect Malware, 3) How to remove PUP software, 4) How to remove Malware, 5) What to do when you have a severe Malware infection, and 6) How to reinstall your operating system.
-
This is an obvious guide on how to avoid malware. The reason I call it “obvious” is because the tips you see in here are very easy, low level, and you’ve probably heard of them before. When we talk about malware we are referring to a generic description of any unwanted items on your computer. […]
-
Merriam-Webster defines “phishing” as “a scam by which an e-mail user is duped into revealing personal or confidential information which the scammer can use illicitly.” So, basically, there are bad guys out there fishing for your personal and professional data. It’s up to you not to get hooked. How do you identify a phishing email? There […]