Skip to main content
Apply

Enterprise Information Technology

Open Main MenuClose Main Menu

Ensuring digital security

through education and awareness
Enterprise IT values educating staff, faculty and students about how to stay cybersecure. From learning the importance of protecting sensitive information to different types of security threats and how to avoid them, use the digital security resources below to ensure your cyber safety. 
dfadf

Protect yourself from threats

There are many ways individuals are targeted by malicious cyber activity. By using our tips below, you can protect your computers, devices and personal information from the latest threats.

.29Milliseconds

A password that is 7 characters long can be hacked in .29 milliseconds. A 14 character password can take two centuries to hack.

Types of security incidents

Phishing

A technique used as an attempt to obtain sensitive information from a user. Information gathered includes login credentials and personal information. Phishing is usually in the form of an email, text or phone call.

System Compromise

Occurs when an unauthorized user gains access to an information system such as a computer, software or network. This can happen from email scams or having weak passwords.

Financial Scam

Involves convincing users to pay money for various reasons. Scam could claim to be in response to a tax audit or winning a 'prize'. Users can be targeted through email, text or phone calls.

Malware

Any software intentionally designed to a computer, server or user. Can be used to leak private information, gain acess to user information and passwords.

Credential Compromise

A cyber-attack that uses lists of leaked passwords to log into online accounts and steal personal and financial information.

Malicious Email

Usually contain a link or document for the user to visit or open. After opening, the user's computer is infected with malware that can steal sensitive information.

Job Scam

Usually conducted via email, will appear to be offering the user a job. Can steal personal information such as SSN and passwords.

Gift Card Scam

Usually conducted via email, scam uses a short message to ask if the recipient is available to buy gift cards as a form of payment for something.

Digital security resourcesFind more information about ways to stay cyber safe

MENUCLOSE