Spammers send millions of phishing emails trying to trick people into divulging passwords, personal information, account numbers, and more. They can even make email and URLs appear as though they’re coming from Indiana University.
Stories Tagged as “privacy”
Email is an inexpensive and popular method for distributing fraudulent messages to potential victims. Most fraud is carried out in hopes of obtaining access to account numbers and passwords. Visit the KB for details on various types of email fraud.
Computing systems — including desktops and laptops, networking equipment, cell phones, smart phones, and other mobile devices — store many kinds of personal and institutional data.
Drawn from internal and external security experts, postings in the Protect IU blog cover topics ranging from privacy to information security and policy. A recent post points out the risks involved in the loss or theft of portable devices and media.
IU’s Center for Applied Cybersecurity Research and the University of Oxford’s Internet Institute are co-hosting global leaders in the field of information innovation and management as part of the inaugural Oxford Digital Data Dialogue beginning today, Sept. 21. The event is being held at the University of Oxford in the U.K., where corporate leaders, scholars and journalists are connecting at an exclusive executive roundtable on managing risk and seizing opportunity in the face of a deluge of digital data.
Join fellow IU Webserve publishers for a demo of the IU Privacy Notice Generator, and discussion of university policy for all IU web publishers.
Sharing your IU passphrase poses a serious risk to your personal privacy.
Drawn from internal and external security experts, postings in the Protect IU blog cover topics ranging from privacy to information security and policy.
IU Deputy Information Security Officer Andrew Korty co-authored an EDUCAUSE Review article on the growing popularity of cloud services and their hidden risks.
Cyber attackers take advantage of vulnerabilities to steal identities, credit card information, and other data. Do not be one of their victims.
IT Help Quickcast 77 — a short how-to podcast — details the four criteria that determine whether data is institutional.
Drawn from internal and external security experts, postings cover topics ranging from privacy to information security and policy.