IT Security Alerts and Advisories 





Phishing for Passwords


There have been a number of recent email-based "phishing" attempts in which recipients are requested to provide their login credentials.  While many of these campaigns look obviously suspicious, some have been very carefully crafted so as to appear to be genuine.

Please be advised that IT Services will never request users to divulge their login information via email.  If you are the recipient of such an email request, please ignore it and delete it. 

If you suspect that you may have been a victim of such a phishing attempt, you should change your password immediately.

 For more information on phishing, see the following article entitled Anatomy of a Phishing Attempt.

 

Encryption

When you store critical or confidential information, you should protect it via encryption.

This is especially so if this data is stored on portable devices like laptops, USB sticks, or even smartphones.

Good encryption software is readily available.  For example, VeraCrypt, is easy to install and use.  Best of all, it’s free!

VeraCrypt gives you the option of creating an encrypted folder, or encrypting your entire hard drive.

When properly encrypted, personal and confidential data will be inaccessible if your portable device is lost or stolen.

To find out more, visit https://veracrypt.codeplex.com.

 

   
   
   
   
   

 

 
   
   
   
   
   
   

 

Twitter Facebook Linkedin Flikr UFV on Google+ YouTube goUFV