4112

Cybersecurity Resolutions for a Safer 2026

January 16, 2026 by Keith Barros | IS&T

Happy New Year, Panthers! As the Chief Information Security Officer (CISO) here at Chapman University, January is a great time to refresh the habits that keep our community safe online. I’m guessing most of you are not like me and didn’t make any New Year’s cybersecurity resolutions. No worries, I made some for you. To kick off 2026, here are practical New Year’s Cybersecurity

4108

When AI Becomes the Attack Vector

January 12, 2026 by | IS&T

AI tools have quickly become part of everyday work in higher education. You might use them to troubleshoot a tech issue, draft a document, prep a lesson, or answer a quick question. That convenience is exactly what attackers are now exploiting. Recent security research, including reports from Malwarebytes, highlights a growing campaign where malicious Google ads and

4104

Announcing IS&T’s Spring 2026 Technology Workshops

December 4, 2025 by | IS&T

Chapman University’s Information Systems and Technology (IS&T) team is pleased to share the upcoming Technology Workshops for Spring 2026. These workshops will focus on enhancing productivity, creativity, and the application of artificial intelligence (AI). Why Attend?  Professional Support: The IS&T training team will guide you through the latest technologies and best practices. Engaging Learning Experience: Join live sessions, participate in discussions, and view demonstrations to deepen your understanding of the

4095

Scammer Claus Returns—New and Improved with AI and Deepfakes

November 25, 2025 by Keith Barros | IS&T

December is here again, and while we’re busy with holiday cheer, finals, and festivities, cybercriminals are busy upgrading their toolkits. As the Chief Information Security Officer (CISO) at Chapman, my goal is to keep our community safe online throughout the season.  Last year, we met Scammer Claus—the holiday trickster who lured victims with fake emails and festive scams. This year, Scammer Claus has

4098

Balancing Productivity with Security and Privacy Risks

November 19, 2025 by Keith Barros | IS&T News

As higher education institutions increasingly adopt AI-powered tools to enhance productivity and digital experiences, it’s essential to remain vigilant about the security and privacy implications of these emerging technologies. This article examines the leading AI browsers and highlights their unique risks and considerations for academic environments. Most of these browsers offer powerful AI-driven features that

4078

The Dancing Turkey Incident: A Cybersecurity Thanksgiving Special

October 31, 2025 by Keith Barros | IS&T

On Thanksgiving Eve, while the rest of Plymouth Rock Institute of Technology (PRIT) was bustling with students heading home and staff shutting down their offices, one employee lingered at their desk, catching up on emails. Among the usual clutter sat a message with the cheerful subject line: “Happy Thanksgiving!” It looked harmless enough, festive, even.

4085

Recognizing and Reporting Phishing, Deepfakes, and Job Scams

October 27, 2025 by | IS&T

Cybercriminals are constantly refining their tactics, and phishing remains the most prevalent and dangerous form of social engineering. With the rise of AI, these attacks are becoming more convincing, harder to detect, and increasingly personalized. We would like to share some tips on how to detect and report the most prevalent phishing emails and scams.

4081

Keep Your Devices Safe: The Importance of Software Updates

October 16, 2025 by | IS&T

Operating system and software updates are more than just routine maintenance—they’re your device’s first line of defense. While they often improve performance and introduce new features, their vital role is patching vulnerabilities that cybercriminals could exploit. By regularly updating your apps and operating systems, you reduce your exposure to threats and ensure your technology runs

4073

Strengthen Your Security:  The Power of Two-Factor Authentication

October 9, 2025 by | IS&T

Every account is a potential target for cyber threats, from campus portals to personal email and social media. That’s why enabling Two-Factor Authentication (2FA) across university systems and personal devices is a smart, proactive step toward protecting your data. What is Two-Factor Authentication (2FA)? Two-Factor Authentication (2FA), also known as Multifactor Authentication (MFA), adds an

4068

Use Strong Passwords and a Password Manager

October 1, 2025 by | IS&T

Passwords are the keys to our digital lives. From class registration and email accounts to banking and social media, every online service requires them. Unfortunately, weak or reused passwords remain one of the biggest reasons for compromised accounts. With so many data breaches, stale, old passwords are prime material for the hackers lurking in the

Log In
Open Main Menu