Search5 Results
- Knowledge Base
- Information Technologies (IT)
- IT Security & Policy
- Information Security
Always use a strong password to protect your computer, mobile device and online accounts. Select a strong password with a mix of upper and lower case letters, numbers and special characters.
- Knowledge Base
- Information Technologies (IT)
- IT Security & Policy
- Information Security
Mobile Security refers to security of personal and business-related information stored on mobile devices such as smartphones and tablets. These mobile devices are targets for attacks because a lot of people leave them on all the time, unlike regular computers.
- Knowledge Base
- Information Technologies (IT)
- IT Security & Policy
- Information Security
Malware is a general term for any software that can interrupt computer operations, gather sensitive information, or gain access to a system of computers. Malware may include computer viruses, worms, trojan horses, ransomware, spywear, adware, and scareware to name a few.
- Knowledge Base
- Information Technologies (IT)
- IT Security & Policy
- Information Security
Identity Theft is defined as the fraudulent acquisition and use of an individual's personally identifying information, usually for financial gain. Key pieces of personally identifying information include such items as social security, insurance, or driver's license numbers. Thieves who steal such information may then use it to obtain credit, merchandise, or medical drugs and services, all in the name of the victim.
- Knowledge Base
- Information Technologies (IT)
- IT Security & Policy
- Information Security
Phishing attacks are attempts to collect sensitive information such as social security numbers, passwords, usernames, credit cards (and sometimes cash - usually in the form of a wire transfer) in the form of an electronic communication. When attackers get the victim to bite the bait then phishing succeeds.