Beware of Microsoft Phone Scams
Posted: September 16, 2016
Scammers can be very creative and tricky. One ongoing social engineering attack is from scammers who claim to be from Microsoft. Read More
Posted: September 16, 2016
Scammers can be very creative and tricky. One ongoing social engineering attack is from scammers who claim to be from Microsoft. Read More
Posted: September 26, 2014
Here are a few suggestions on ways to keep your personal information more secure when you go online. Read More
The FTC has issued a warning about fake IRS calls that are tricking consumers into paying money they supposedly owe but will only accept payment via prepaid card or wire transfer. Read More
Posted: July 31, 2014
The privacy and security of health information is extremely important. Read More
Posted: July 16, 2014
Most people access and share information by connecting to the internet via a computer, tablet, or smartphone. Read More
Posted: April 16, 2014
Tax season is here and the race begins between individuals collecting all their tax related forms…..
Read More
Posted: January 24, 2014
Data Privacy Day (DPD) is held each year on January 28th to educate people on the importance of protecting their privacy.Read More
Posted: December 24, 2013
Imagine you are working on your computer and suddenly you see a message telling you that your personal files have been encrypted and will not be accessible to you unless you pay a fee. Read More
Posted: November 25, 2013
Public Wi-Fi is very convenient for anyone looking to surf the web while on a lunch break or while at a coffee shop. Read More
Posted: November 6, 2013
An APT an attempt to obtain sensitive information that uses a variety of techniques. Read More
Posted: August 26, 2013
Currently more than half of all American adults use smartphones, according to the Pew Research Center’s Internet & American Life Project. Read More
Posted: June 21, 2013
As faculty and staff start receiving their W2s and other tax related documents, it is time to start thinking about filing income tax returns - early. Read More
Posted: February 5, 2013
Data Privacy Day is an annual international event held each year on January 28th since 2008. Read More
Posted: January 28, 2013
Many U.S. bank customers may have experienced non-availability or dramatic slowdowns when attempting to access their online bank accounts recently. Read More
Posted: November 6, 2012
Sensitive information on paper is the same as sensitive information on a computer. Both need to be protected from unauthorized access or disclosure and should be treated with caution and discretion. Read More
Posted: August 1, 2012
By now most of us are aware of fake emails that claim to come from your bank. Read More
Posted: May 3, 2012
The first known drive-by attack to target mobile phones has been discovered. Read More
Posted: June 19, 2012
As wage earners everywhere gather their W-2’s, the Internal Revenue Service (IRS) is combating several new attempts to defraud taxpayers. Read More
Posted: March 12, 2012
Phone hacking has been in the news lately, but just what happened and how I can protect myself? Read More
Posted: August 22, 2011
A recent report indicates children are increasingly at risk of identity theft — and such crimes can go unnoticed for years. Read More
Posted: July 1, 2011
As we increasingly rely on our phones as an extension of our computers, more personal and business information is stored and transferred on them. Read More
Posted: March 1, 2011
In one of the largest security breaches, cyber thieves stole a list of email addresses from Epsilon. Read More
Posted: April 18, 2011
The use of some type of high speed Internet connection at home such as DSL or cable modem is now almost as common as a phone line. Read More
Posted: October 5, 2010
University of Miami workforce should know their responsibilities when given system access. Read More
Posted: August 19, 2010
Your new printer/multifunction device is open security risks, so it’s important to follow some basic security procedures to minimize the risk. Read More
Posted: July 29, 2010
Malvertising takes advantage of your security knowledge. Online advertisements pose as antivirus software to make you believe your computer has been infected. Read More
Posted: April 30, 2010
Consumers need to be wary of con artists who pretend to be Census takers but are really out to steal personal information or commit other frauds. Read More
Posted: April 6, 2010
In the wake of the natural disaster that occurred on 1/12/2010, cyber-crooks have rushed to create websites with Haiti earthquake-themed names. Read More
Posted: January 20, 2010
Travel is often essential when conducting and promoting University business and research, but there are precautions that should be taken. Read More
Posted: October 21, 2009
It’s easy to be lured into joining social networking sites like Facebook, MySpace, and others. Read More
Posted: June 23, 2009
Fraudulent emails are again promising tax refunds or stimulus payments. Read More
Posted: March 31, 2009
An increasing number of people are choosing the convenience of online shopping over trudging off to the malls. Online shopping is the retail industry’s biggest growth engine, but with the increase in online shopping also comes greater exposure to fraud. Read More
Posted: December 11, 2009
Ever wonder why your computer sometimes runs slowly? Maybe you’re not the only one using it. Read More
Posted: February 11, 2009
Portable electronic storage devices are very popular because of their portability and low prices. Read More
Posted: January 12, 2009
As the presidential election approaches, be aware of email spam used to install malicious software. Read More
Posted: October 10, 2008
Vishing combines social engineering and the phone system to gain access to a victim’s personal sensitive information. Read More
Posted: July 16, 2008
Occasionally, medical and other sensitive records must be transported from one location to another, such as when moving to a new office. Read More
Posted: April 8, 2008
Encryption is a procedure that scrambles information in a way that is decipherable only to authorized individuals or computers. Read More
Posted: March 11, 2008
Portable devices may store information you do not want anyone else to access. Read More
Posted: January 25, 2008
Medical identity theft occurs when a person uses someone else’s personal information to obtain or make false claims for medical services or goods. Read More
Posted: December 1, 2007
Identity theft is a crime where personally identifiable information is used without authorization to commit fraud or other crimes. Read More
Posted: October 17, 2007
It is important to remember that any application installed on your computer can have vulnerabilities that could allow a security breach. Read More
Posted: July 27, 2007
Improper disclosures of sensitive data can cause immeasurable damage. Read More
Posted: September 13, 2007
High speed internet connections for home users, either by cable modem or DSL, are increasingly affordable and available. Read More
Posted: June 6, 2007
Unsuspecting users are giving computer hackers access to data on their wireless devices. Read More
Posted April 4, 2007
The VA department reported that a laptop containing the personal information of 26.5 million veterans was stolen from an employee’s home. Read More
Posted June 21, 2006
University of Miami workforce members must be mindful of their responsibilities when given access to University information systems. Read More
Posted August 17, 2006
“Social engineering” is a term used in information security to describe activities that attempt to con and deceive people. The aim is to get someone to willingly give privileged information by taking advantage of the user’s good will, trust and desire to be helpful. Read More
Posted March 9, 2006
The adoption of wireless, handheld devices is becoming widespread. Personal Digital Assistants such as Blackberry, smart phones, and removable storage devices enable mobile ad-hoc networking of the workforce and provide flexible enterprise data access. Read More
Posted October 20, 2005
The HIPAA Security Rule requires a “Unique User Identification” standard for systems holding electronic protected health information (EPHI). Read More
Posted August 18, 2005
PHI is individually identifiable health information which is created or received by a health care provider, health plan, or health care clearinghouse. Such information relates to the past, present or future physical health, mental health or condition of an individual. Read More
Posted June 20, 2005
At any given moment, there are thousands of email hoaxes circulating on the Internet in the form of chain letters containing misleading information. Read More
Posted April 11, 2005
Sensitive information on paper is the same as sensitive information on a computer. Both need to be protected from unauthorized access and should be treated with caution and discretion. Read More
Posted March 21, 2005
As the Web becomes more commonplace, web designers face increasing pressure to create web sites that are more visually appealing than their competitors. Read More
Posted February 28, 2005
Passwords are the most vulnerable entry-point to our IT resources. Read More
Posted February 14, 2005
Instant Messaging (IM) is a popular form of electronic communication that enables users to exchange text-based messages and files in real-time. Read More
Posted January 17, 2005
Electronic mail (email) is rapidly becoming the preferred method of business communication because it is fast, inexpensive, and relatively simple to use. Read More
Posted: February 1, 2005
Peer to Peer (P2P) file-sharing applications allows file sharing with other computers over the Internet. Some P2P applications include Limewire and Morpheus.. Read More
Posted January 3, 2005
“Malware” or malicious software is one of the greatest threats to the confidentiality, integrity and availability of electronic protected health information (EPHI). Read More
Posted December 6, 2004
The portability of a laptop gives you the convenience of being able to work almost anywhere. This convenience, however, comes with increased risks. Read More
Posted November 22, 2004
Spyware is software used to collect, record and transmit your computer information to a third party, in order to track your online viewing and spending habits. Read More
Posted November 8, 2004
Many of us have become targets of “phishing”, where scammers send emails pretending to be from banks, credit card companies, or online retailers. Read More
Posted October 25, 2004
Many of us receive on-campus visits from individuals who are not members of the University of Miami workforce. While we may carefully monitor the activities of visitors who are strangers, we often let our guard down when visitors are already known to us. Read More
Posted October 11, 2004
The availability of electronic data (files, records, etc) to authorized individuals is critical to the continued operation of every enterprise. Read More
Posted September 24, 2004
Locking your computer is a simple way to prevent unauthorized access to your machine. Read More
Posted September 13, 2004
Our systems require the use of passwords to access the various networks and applications across our campus. Read More
Posted August 31, 2004