Information Security Hub

Information Security is everyone鈥檚 responsibility. The 麻豆色情片 Information Technology Department wants to make sure our community has the tools, information, and resources we need in order to combat the growing cybersecurity threats we face. At the 麻豆色情片 Information Security Hub website, you鈥檒l find useful content on how to protect your personal information, assets, and University data as well as important information on the latest security issues.

Six Things You Can Do To Keep Your Online Accounts Safe

  1. Protect your password
    • Don't use the same password for multiple sites online.
    • Never share your password.  You should be the only one who knows it.
    • Avoid including your name or common words.  Your password should be difficult to guess.
  2. Use extra security features offered by the site, such as two-factor or two-step authentication.
  3. Make sure your email account(s) are secure.
  4. Log out of your accounts (i.e. Facebook, Gmail) when you use a computer you share with other people.
  5. Run anti-virus software on your computer.
  6. Think before you click or download anything.

麻豆色情片 provides authorized employees the ability to utilize remote access to connect to 麻豆色情片 computing resources for which they have been granted approval. Click to view the 麻豆色情片 remote access policy and to request access. 

Tips for staying secure while working remotely:

  • Assume that any network that you connect to while traveling cannot be trusted. This includes networks that require a password such as at a hotel or convention center. You do not know who set them up or who is connected to them.
  • Do not use public computers to log in to accounts or access sensitive information. The computer may have a virus or malware on it either by accident or on purpose.
  • Lock your mobile devices and/or laptop with a strong password or passcode. If it is lost or stolen, someone will not be able to access the information that is on it.
  • Install or enable tracking software on your device. In the event that it is lost or stolen, you will be able to track where your device is and possibly even remotely wipe it if needed.
  • Never leave your device or laptop in a car where they are easily seen. Criminals are more likely to break into a vehicle if they see items of value.


Below are resources to help maintain security for University data for staff and faculty who are working remotely.  

Securing Your Home Network

VPN Policy

Staying Secure on the Road






What is phishing?

Phishing is an attack that uses email or a messaging service to trick you into taking an action such as clicking on a malicious link, opening an infected attachment, or responding to a scam. The message is crafted to look like it came from someone or something you know.

Spear Phishing

Unlike a generic phishing message, spear phishing emails are customized for the intended recipient. Individuals are more likely to fall victim to these attacks due to their personalized nature.

Common clues that a message is a phishing attack:

  • The email appears to be from an 麻豆色情片 source but the subject field contains [EXT] when checking University email. This signifies that an email was sent from a source external to 麻豆色情片.
  • The email appears to com from a legitimate organization but the "From" address is from a personal email such as
  • The message comes from and official email but has a "Reply to" address going to a personal email.
  • There is a sense of urgency or it requires "immediate action" before something bad happens.
  • Something looks too good to be true.
  • Contains a generic salutation such as "Dear Customer"
  • The email requests sensitive information such as credit card numbers, passwords, or other information that a legitimate sender should already know.

What should I do if I receive a suspicious email?

  • Do not click on any links or download any attachments.
  • Contact the company or sender through other means (i.e. phone or through their website).
  • Submit the email to MediaTech ( for assistance.
  • Forward the email to






What is SPAM?

SPAM is electronic junk mail.  The term refers to email that is unsolicited, sent in bulk form, and unwanted.

What is phishing?

Phishing scams involve defrauding email recipients by acting as legitimate companies or organizations to obtain sensitive information (such as passwords or financial information).

What do SPAM and phishing emails look like?

Here are some examples received by 麻豆色情片 community members:

What should I do if I receive a suspicious email?

  • Do not click on any links or download any attachments.
  • Contact the company or sender through other means (i.e. phone or through their website), not through the email.
  • Call the MediaTech service desk at 401-254-6363 for help if needed.
  • Forward the email to  It may be added to this page to help the 麻豆色情片 community recognize fraudulent emails in future.

Where can I get more information?

site has additional information regarding SPAM and Phishing, along with other cybersecurity topics.

Here are some basic tips for recognizing email scams:

  • When the email asks you to send personal or account info (like your user name and password, date of birth, social security number or financial information) by replying to the email.  麻豆色情片 and other legitimate companies or organizations will never ask you to provide this info via email.
  • When the tone is personal, but it looks like a group email with a generic greeting (for example, "Dear Trusted Sir or Madam").
  • When the subject or content refers to "you've exceeded your limit" or "click here to upgrade".
  • When the sender's email address is from an overseas domain (for example:
  • When the sender's email is from a general "email support team" or "administrator".
  • When the sender's email address has a domain that's a string of seemingly random numbers or letters (for example @VNbM6fs).
  • When the sender's name in the header doesn't match the sender's email address.
  • When the offer seems too good to be true.

Everyone who uses any sort of computer or mobile device is a potential target to cyber attackers. They use automated tools to do all the work making it easy for them to target large numbers of people. The more people that they target the more success they will eventually have. Attackers have different motivations and hacking you helps them achieve their goal, be it to make money or use your computer to hack or harm others.

What can you do to protect yourself?

  • If something is extremely urgent, odd, suspicious, or too good to be true, it is likely an attack.
  • Make sure that your computers and devices are up-to-date and enable automatic updating.
  • Use a strong, unique password or passphrase for each of your accounts.
  • Protect your devices with a strong unique password, PIN, or other type of locking mechanism.

Clues that you may have been hacked:

  • Your anti-virus alerted you that your system is infected. Open your anti-virus program to make sure that the alert was from it and not from a pop-up window trying to fool you into installing a program or calling a number.
  • Friends ask you why you are spamming them with emails you know you did not send.
  • Your password does not work even though you know it is correct.
  • Your browser is taking you to websites that you did not want to go to.

I think I've been hacked, now what?

  • Use a different computer or device to change your passwords, don't forget to change passwords to online accounts.
  • Monitor your credit cards and financial accounts for any unusual activity.
  • Follow the recommendations of your anti-virus program if it tells you that a file is infected.
  • If you think that you are the victim of identity theft, visit .



You Are A Target

Disposing of Your Mobile Device

Social Engineering

Staying Secure on the Road

Your home Wi-Fi network is what allows you to wirelessly connect your devices to the internet. This includes devices such as laptops, tablets, gaming consoles, and televisions. Securing your home network is a part of protecting your home.

Tips for securing your home network:

  • Change the default password on you internet router. The default admin login information is often well known to criminals and may even be posted to the internet.
  • Change the default name of your wireless network. Make sure that it is something unique and that it does not contain any personal information.
  • Make sure that a password is required to connect to your network. The password should be different from the admin account password. Be sure to only allow people you trust to connect and use your wireless connection.
  • Utilize a guest network if you are going to allow guests to connect to your network. A guest network allows access to the internet but does not allow them to connect to other devices on your home network. Again, make sure that a password is required to connect to the guest network.
  • Speaking of passwords... make sure that all passwords / passphrases are strong and different from each other. Use a password manager program to keep track of your passwords / passphrases. Enable 2-factor authentication when available.
  • Make sure that all the devices connected to you home network are secure by making sure that they are always running the latest version of their operating system or firmware. Enabling automatic updates when possible helps to ensure this.


Smart Home Devices

Smart home devices are the myriad of devices such as light bulbs, speakers, TVs, and door locks that connect to the internet. They bring a certain amount of convenience into the home but they also bring unique dangers. Many of the devices have little or no security built into them.

Tips for protecting devices:

  • Only connect what you need. Don't connect devices that you don't need to be online.
  • Keep devices up-to-date and enable automatic updating if able to do so.
  • Change the default passwords if possible. Make sure to use strong, unique passwords / passphrases.
  • If you are able to configure privacy options, limit the amount of information the device collects or shares. Consider disabling information sharing capabilities all together.
  • Buy devices from companies you know and trust.
  • If a device utilizes voice commands then it is constantly listening. Consider this when deciding where to place it.
  • Consider putting your devices on a "Guest" network instead of your main wireless network. This keeps your main network safe if a smart home device becomes infected.





Disposing of Your Mobile Device

Four Steps to Staying Secure

Securing Your Home Network

Social Engineering

Staying Secure on the Road

Sharing Data with 3rd Party Agencies

麻豆色情片 is committed to protecting the personal information of the University community. In certain business practices, 麻豆色情片 benefits from sharing sensitive data with outside vendors. Payroll processing is one example. Although these partnerships are needed, they can lead to unauthorized data exposure. To help mitigate this risk, the University鈥檚 Written Information Security Program notes a safeguard measure (Safeguards, section 5) that evaluates a vendor鈥檚 security posture. This evaluation is summarized by a questionnaire that captures how our business partners will secure the data shared with them. A completed questionnaire is required for all 3rd party service contracts that share restricted university data. For more information on this process or obtain a copy of the questionnaire, please visit the following .

Other Resources

麻豆色情片 Mobile Applications Management Frequently Asked Questions (FAQ)



Disposing of Your Mobile Device

Using the Cloud Securely

Social Engineering

Staying Secure on the Road

Personalized Scams

Personalized scams are customized for the intended recipient. Attackers are able to easily obtain databases of people's names, passwords, or other details due to the vast number of websites that have already been hacked. Attackers can use this information to trick people into thinking that they have hacked into their system by crafting an email with some personal details about the victim. They then use fear and extortion to try to force the victim into paying them money. The key to remember is that in almost every situation your system was never hacked in the first place.

Clues to look for:

  • Be suspicious if you receive a highly urgent email, message, or phone call. Attackers want to rush you into making a mistake.
  • Payment is demanded in Bitcoin, gift cards, or other untraceable methods.
  • If the email looks suspicious, search online to see if anyone has reported a similar attack.


Phone Call Attacks

Attackers use phone calls to try to trick people into doing what they want by creating situations that seem very urgent so that they rush into making a mistake. Common situations are: pretending to be from a government tax department saying you have unpaid taxes or pretending to be from Microsoft Tech Support and telling the victim that their computer is infected.

Things to keep in mind:

  • Be suspicious anytime someone calls you and creates a sense of urgency.
  • If you think that the call is an attack, hang up. Call the organization directly yourself to verify if the call was legitimate.
  • Never trust Caller ID. Phone numbers can be spoofed to look like they come from legitimate organizations.
  • Never allow a caller to take temporary control of your computer or trick you into downloading software.
  • If a call is not from someone you know, let it go to voicemail. Let the caller leave a message and review calls on your own time.


Smishing / Messaging Attacks

In a smishing or messaging attack, the attacker uses SMS, texting, or messaging to reach out to their victim to try to trick them into taking an action that they should not take. These types of attacks feel more informal than email making it more likely that someone will fall for them.

Clues of an attack:

  • Be suspicious of a message that creates a sense of urgency.
  • The message sounds too good to be true.
  • The message appears to come from someone you know but the wording does not seem like them.
  • The message asks for sensitive information that they should already have access to.


Malware / Ransomware

Malware is software used to perform malicious actions such as spying on online activity, sealing passwords or files, or using your system to attack others. Malware can infect any device including Mac computers and smartphones to DVRs and security cameras.

Ransomware is a special type of malware that encrypts files making them inaccessible. Attackers then require that you pay them a ransom, usually in digital currency such as Bitcoin, before they will decrypt your files. Paying the ransom is not a guarantee though that you will be able to recover your files. The attackers may not provide a decryption method, something could go wrong with the decryption process, or they may infect your computer with additional malware.

Steps you can take to protect yourself:

  • Keep your computer and devices up-to-date and enable automatic updating whenever possible.
  • Install trusted anti-virus software.
  • Only download and install programs and apps from trusted online stores.
  • Be suspicious of messages that create a sense of urgency or seem too good to be true.
  • Regularly back up your system and files wither to Cloud-based services or store your backups offline, such as on a disconnected hard drive.






Social Engineering

Staying Secure on the Road

麻豆色情片 IT provides cybersecurity awareness training. To access this training, go to and use your 麻豆色情片 email username and password to sign in.

SANS also publishes a monthly newsletter highlighting different cybersecurity awareness topics that can be found . 

2 Factor Authentication FAQ

2 Factor Authentication for o365 Email

I'm Hacked.  Now What?

What is Anti-Virus?

What is Malware?

Using the Cloud Securely

(Requires 麻豆色情片 username and password to view video)

Mobile devices have become an important part of daily life as not only a means to communicate with others but for may other uses such as online banking. The biggest threat to your mobile device is you. it is much more likely that you will lose or forget a mobile device than it is for it to be hacked.

Tips for securing your device:

  • Enable the screen lock and require that a passcode or fingerprint is needed to unlock it.
  • Enable automatic updating. Devices running the most recent version of their operating system and apps are harder to hack.
  • Install or enable tracking abilities so that you can tract your device over the internet. This makes it possible to locate it and may allow you to remotely wipe all of your information off the device if needed.
  • Only download apps from trusted sources such as the Apple App Store or Google Play. Apps from other sites are more likely to be infected. Delete apps that you no longer use of need.

When you are ready to dispose of or donate your device, you should securely wipe it which erases all the data on the device. The easiest method to to this to perform a factory reset on your device. Additionally, you should remove the SIM card and physically destroy it as it retains information about your account. If you have an employer issued device, check with your supervisor about proper disposal procedures.

Passwords / Passphrases

Strong passwords are essential to safeguard your personal information. Once a cybercriminal has your password, they may be able to access your bank account, read your email, or worse. Traditional passwords can be complex, hard to remember, and confusing. It is now recommended to use a passphrase instead. A passphrase is a series of random words (Green-Luck-Easily) or a sentence (Time for Coffee!) which are easier to remember but harder for attackers to hack. They are strong because they use capital letters and symbols. TO make them even stronger, letters can be replaced with symbols such as using the @ symbol in place of the letter 'a'.

Tips for using passphrases:

  • Use a different passphrase for each different device and account. Consider using a password manager program that securely stores your passphrases for you.
  • Never share your passphrase with anyone. The only exception would be to share it with a trusted family member in case of an emergency.
  • Do not use public computers to log in to accounts. The computer may have a virus or malware on it either by accident or on purpose.
  • Use two-factor authentication whenever possible. This is where something like a passcode sent to your smartphone is needed in addition to your passphrase in order to log in to your account.
  • Use a PIN, passphrase, or biometric (fingerprint) method to protect mobile devices. 
  • Close, delete, or disable accounts you no longer use.


2 Factor Authentication

麻豆色情片 uses a high-security email login procedure known as 2-factor authentication in an effort to prevent password compromise and improve account security. With this procedure you will need to set up a phone to use to authenticate your account. The easiest and most flexible option is to use a cell phone, which can provide authentication through a specific Authenticator app, through text message, or through a voice call. Alternately, you can set up a landline phone (office, home, or other) as a method of authentication. However, if a landline is used, you will need to be at that location when you are authenticating your account.

For more information on 2-factor authentication, click here.

For information on how to set up 2-factor authentication, click here.

Contact the MediaTech help desk at x6363 if you have any questions or need help setting up 2-factor authentication.


Now more than ever, consumers spend increasing amounts of time on the Internet. With every social media account you sign up for, every picture you post, and status you update, you are sharing information about yourself with the world. How can you be proactive and 鈥淒o Your Part. #BeCyberSmart鈥? Take these simple steps to connect with confidence and safely navigate the social media world.


  • In 2021 4.48 billion people are now using social media worldwide. That鈥檚 an increase of more than 13% from 2020. Put another way: Almost 57% of the total world population are using social networks.
  • Digital consumers spend nearly 2.5 hours on social networks and social messaging every day. 


  • If You Connect IT, Protect IT. Whether it鈥檚 your computer, smartphone, game device, or other network devices, the best defense against viruses and malware is to update to the latest security software, web browser, and operating systems. Sign up for automatic updates, if you can, and protect your devices with anti-virus software.
  • Never click and tell. Limit what information you post on social media鈥攆rom personal addresses to where you like to grab coffee. What many people don鈥檛 realize is that these seemingly random details are all that criminals need to know to target you, your loved ones, and your physical belongings鈥攐nline and in the real world. Keep Social Security numbers, account numbers, and passwords private, as well as specific information about yourself, such as your full name, address, birthday, and even vacation plans. Disable location services that allow anyone to see where you are鈥攁nd where you aren鈥檛鈥攁t any given time.
  • Speak up if you鈥檙e uncomfortable. If a friend posts something about you that makes you uncomfortable or you think is inappropriate, let them know. Likewise, stay open-minded if a friend approaches you because something you鈥檝e posted makes them uncomfortable. People have different tolerances for how much the world knows about them, and it is important to respect those differences. Don鈥檛 hesitate to report any instance of cyberbullying you see.
  • Report suspicious or harassing activity. Work with your social media platform to report and possibly block harassing users. Report an incident if you鈥檝e been a victim of cybercrime. Local and national authorities are ready to help you.
  • Remember, there is no 鈥楧elete鈥 button on the Internet. Share with care, because even if you delete a post or picture from your profile seconds after posting it, chances are someone still saw it.
  • Update your privacy settings. Set the privacy and security settings to your comfort level for information sharing. Disable geotagging, which allows anyone to see where you are鈥攁nd where you aren鈥檛鈥攁t any given time.
  • Connect only with people you trust. While some social networks might seem safer for connecting because of the limited personal information shared through them, keep your connections to people you know and trust.



  1. Kemp, Simon. 鈥淗alf a Billion Users Joined Social in the Last Year鈥 Hootsuite July 22, 2021. /
  2. Yik Yak: ?
  3. TikTok:
  4. Instagram: ?