30 posts categorized in

Online Safety

  

Cybersecurity Resolutions for a Safer 2026

January 16, 2026 by Keith Barros | IS&T

Happy New Year, Panthers! As the Chief Information Security Officer (CISO) here at Chapman University, January is a great time to refresh the habits that keep our community safe online. I’m guessing most of you are not like me and didn’t make any New Year’s cybersecurity resolutions. No worries, I made some for you. To kick off 2026, here are practical New Year’s Cybersecurity

When AI Becomes the Attack Vector

January 12, 2026 by | IS&T

AI tools have quickly become part of everyday work in higher education. You might use them to troubleshoot a tech issue, draft a document, prep a lesson, or answer a quick question. That convenience is exactly what attackers are now exploiting. Recent security research, including reports from Malwarebytes, highlights a growing campaign where malicious Google ads and

Scammer Claus Returns—New and Improved with AI and Deepfakes Beware of Cyber Santa 2.0!

November 25, 2025 by Keith Barros | IS&T

December is here again, and while we’re busy with holiday cheer, finals, and festivities, cybercriminals are busy upgrading their toolkits. As the Chief Information Security Officer (CISO) at Chapman, my goal is to keep our community safe online throughout the season.  Last year, we met Scammer Claus—the holiday trickster who lured victims with fake emails and festive scams. This year, Scammer Claus has

The Dancing Turkey Incident: A Cybersecurity Thanksgiving Special

October 31, 2025 by Keith Barros | IS&T

On Thanksgiving Eve, while the rest of Plymouth Rock Institute of Technology (PRIT) was bustling with students heading home and staff shutting down their offices, one employee lingered at their desk, catching up on emails. Among the usual clutter sat a message with the cheerful subject line: “Happy Thanksgiving!” It looked harmless enough, festive, even.

Recognizing and Reporting Phishing, Deepfakes, and Job Scams

October 27, 2025 by | IS&T

Cybercriminals are constantly refining their tactics, and phishing remains the most prevalent and dangerous form of social engineering. With the rise of AI, these attacks are becoming more convincing, harder to detect, and increasingly personalized. We would like to share some tips on how to detect and report the most prevalent phishing emails and scams.

Keep Your Devices Safe: The Importance of Software Updates

October 16, 2025 by | IS&T

Operating system and software updates are more than just routine maintenance—they’re your device’s first line of defense. While they often improve performance and introduce new features, their vital role is patching vulnerabilities that cybercriminals could exploit. By regularly updating your apps and operating systems, you reduce your exposure to threats and ensure your technology runs

Strengthen Your Security:  The Power of Two-Factor Authentication

October 9, 2025 by | IS&T

Every account is a potential target for cyber threats, from campus portals to personal email and social media. That’s why enabling Two-Factor Authentication (2FA) across university systems and personal devices is a smart, proactive step toward protecting your data. What is Two-Factor Authentication (2FA)? Two-Factor Authentication (2FA), also known as Multifactor Authentication (MFA), adds an

Use Strong Passwords and a Password Manager

October 1, 2025 by | IS&T

Passwords are the keys to our digital lives. From class registration and email accounts to banking and social media, every online service requires them. Unfortunately, weak or reused passwords remain one of the biggest reasons for compromised accounts. With so many data breaches, stale, old passwords are prime material for the hackers lurking in the

Stay Safe Online: Easy Steps to Supercharge Your Digital Security

September 25, 2025 by Keith Barros | IS&T

In today’s digital age, personal digital security is not just an individual responsibility but a collective one. At Chapman University, we understand that the security of our digital infrastructure is intrinsically linked to the security practices of each member of our community. When individuals protect their digital environments, they contribute to the overall security of

Log In
Open Main Menu