Passwords
Nearly all private information about us is stored behind a password and as a result, it is imperative you use a strong password. Password strength depends on a number of factors, such as how many characters it is and what type of characters (numbers, uppercase, lowercase, symbols) it uses.
Malware
Malware comes in many different shapes and sizes, ranging from annoying adware to ransomware which can hold your data hostage until you pay the thieves real money. Here you will find best practices to prevent malware infections and a rundown of the different types of malware.
Phishing
Any attempt to trick a user into giving out their credentials (either willingly or unwillingly) is considered a phishing attack. UW-Milwaukee has been hit exceptionally hard recently with such attacks. Learn how to spot a phishing email so you can save yourself a lot of time and hassle!
Identity and Access Management
Identity and access management services are an important set of tools that enable personalized access to resources while still protecting the identity and personal information for members of the UWM campus community.
Mobile Device Guidelines
Since cybercriminals usually cast wide nets to reach more potential victims, mobile users should protect their devices early on to defend against threats.
Resources
Listed below are links to outside resources regarding computer security and virus protection. We welcome suggestions for additional links, contact us!
- UWM Phishing Flyer – “Don’t Take The Bait“
- Staying Safe on Public Wi-Fi
- Microsoft Account Protection Guide
- Microsoft Windows Security Guide
- SysAdmin, Audit, Network and Security (SANS)
- Internet Storm Center
- Educause Security Taskforce
- FTC ID Theft, Privacy and Safety
- FTC Phishing Awareness
- CNET Information Security News
- Sophos AntiVirus Tips
- Mcafee Security Awareness