Skip to main content

Syndicate contentsecurity

Ouch!, Tips for secure Social Media. July 2015

July 1, 2015 by Sue Weier

Are you a social media user?  Facebook, Instagram, Twitter and other social networks are ubiquitous in our communities today.  Take a look at the July 2015 release of Ouch!, for tips on being secure while using social media.  Ouch! comes from SANS, a company that specializes in security training. 

How to use Identity Finder - Windows

October 21, 2014 by Sue Weier

Identity Finder is a software that looks for private (or "restricted") data on your computer and helps you remove or protect it.  Current campus policy strongly recommends that all employees have Identity Finder installed on their computers to comply with the Restricted Data Management policy.  You can read that policy on the CIO's website at https://www.cio.wisc.edu/RestrictedDataMgmt.pdf.  Read more »

Office 365 Phishing Emails

January 27, 2014 by Sue Weier

L&S Security

Over the holidays, my Inbox was inundated with a number of new phishing emails.  Interestingly, I noticed a trend toward phishing emails that referenced Office 365.  Most of these appeared to come from support units similar to the LSS TechZone or the DoIT Helpdesk, but on closer examination proved to be fake. Read more »

Keep calm and Stop Badware

January 3, 2014 by Sue Weier

A patron recently emailed the LSS TechZone with suspicions about an email she received.  This patron had good instincts; the email was a phishing email.  Phishing emails try to acquire personal information or passwords by tricking the recipient into thinking that he or she is at a legitimate site.  This particular email played on the common use of GoogleDocs and GoogleDrive: Read more »

TechZone Tuesday Updates for October 22, 2013

October 21, 2013 by Sue Weier

The following critical updates will be deployed to TechZone-supported computers on Tueday October 22 and Wednesday October 23.  

On Windows:

  • Adobe Reader - update to version 11.0.05
  • Security updates for Internet Explorer 10
  • Chrome update - to version 30.0.1599.101
  • Firefox update - to version 24
  • Flash player update - 11.9.900.117

On MacOS: Read more »

Kidnapped files held for ransom!

October 10, 2013 by Sue Weier

Cryptolocker logo

It sounds absurd, but that's exactly what happens when you are infected with a new virus called CryptoLocker.  This virus encrypts your files so that you can't open or read them.  Then you're asked to pay a sum of money (often $300) to decrypt the files. The encryption is real, and your files may not be recoverable even if you pay the ransom.

How can you avoid this threat?  Some simple precautions may help: Read more »

Identity Finder: What do I do now?

November 12, 2012 by Sue Weier

Identity Finder logo

Identity Finder is a software tool that helps find restricted or sensitive data saved in files on your computer. In departments supported by L&S Learning Support Services, Identity Finder automatically runs each week. When the scan finishes, the report window opens on your desktop.

So what do you do now? 

You're confronted with a list of files that may, or may not, have sensitive data. This article will give you some ideas about how to approach your Identity Finder report. Read more »

Don't be an April Fool! Beware of FakeAV!

April 1, 2011 by Sara Nagreen

We've been seeing a large increase in the number of fake AV infections on PC computers here at the university.  If you don't know what this is, don't be fooled! 

If you are clicking away on the internet, and suddenly a virus warning pops up, be suspicious! Read more »

Encrypting your online conversations

November 8, 2010 by Sara Nagreen

Lock

Working in Van Hise, I hear many different languages.  They are cryptic sounds of beautiful words rolling about, making me imagine exotic and far flung places.

Computers talk languages like this too.  Network traffic is a conversation on a wire, or in the case of the UWNet wireless network, over radio waves.  If you are listening to an unencrypted conversation, you can understand what is being said.  If you are listening on an encrypted conversation, it's like a foreign language to the listener.  The traffic is still there, but it makes no sense.  Read more »

What kind of sensitive data lives on your computer?

November 30, 2009 by Sara Nagreen

When a computer has been broken into, one of the questions that I will ask the end user is "Do you have any sensitive data on this machine?"

What is "sensitive data"?  Well, anything that might be used to steal someone's identity. Read more »

Premium Drupal Themes by Adaptivethemes