Information Security Blog
New Phishing StatisticsNew studies have found that 1/3 of all phishing attempts last year went after bank accounts or other financial information directly. Read more on our blog.
The Evolution of Anti-Virus SoftwareLearn how breach detection systems are the future of current anti-virus protection. Read more on our blog.
Summer Security TipsKeep these tips in mind this summer to protect yourself and your information. Read more on our blog.
Facebook's Dino Security StepsFind out what changes Facebook have made to protect user privacy. Read more on our blog.
The Heartbleed BugGet more information on the recently discovered Heartbleed bug and what you need to do. Read more on our blog.
Wireless Network Security ImprovementsLearn about changes to the wireless networks that will help secure the campus. Read more on our blog.
Tax Season ScamsProtect yourself and your tax return from phishing. Read more on our blog.
Phishing in FocusTake a closer look at how phishing scams are becoming smarter. Read more on our blog.
Data Privacy Month Wrap-upMiss anything during Data Privacy Month? Catch up with our blog.
Staying Safe on Social NetworksDid you know that up to 11% of Facebook accounts are fake? Read more on our blog.
Protect Yourself Against PhishingPrevent your data from getting stolen by learning more about phishing. Read more at our blog.
Dangers of Using Public Wi-FiStay safe while you're browsing on the go. Read more on our blog.
Understanding the Importance of Identity TheftKeeping your data secure and private can save you money and hassle. Read more on our blog.
January 28th is Data Privacy Day!Today is dedicated to a topic that has been on the news and a lot of our minds for the past year, data privacy. Read more on our blog.
Phishing Used to Compromise AccountsRecently, researchers at Trustwave found a botnet controller that contained roughly 2 million credentials (passwords). Read more on our blog.
A Computer Security Tips for Preventing Malware InfectionsA few tips to prevent malware infections from compromised websites or that are intended to exploit browser plug-ins. Read more on our blog.
Password Best PracticesLearn about how to create strong passwords and how to manage them. Read more on our blog.
Data Privacy and Security for Institutional DataSome tips for practicing good data stewardship of institutional data. Read more on our blog.
Social Networking Security TipsSocial networking sites have changed the way we communicate and keep track of one-another. Read this blog for security tips for social networking sites. Read more on our blog.
Anatomy of a Spear Phishing Email
This post covers a real spear phishing attack against WIT members. Read more on our blog.