73 posts categorized in

Information Security

  

Why Storing Passwords in a Web Browser Is Risky

June 4, 2025 by Keith Barros | IS&T

As your Chief Information Security Officer (CISO), I want to chat with you about something important: storing passwords in your web browser. When I speak with members of the Chapman Community, I often get asked if storing passwords in your web browser is a good idea. While saving your passwords there might seem very convenient,

Cybersecurity Tips for the End of the Academic and Financial Year

May 2, 2025 by Keith Barros | IS&T

As the Chief Information Security Officer (CISO) at Chapman University, I want to remind everyone in our university community to stay vigilant as we approach the end of the academic and fiscal year. This time of year can be hectic and stressful, making it easier for cyber threats to slip through the cracks. Phishing attacks

Cybersecurity Through the Eyes of the Turtle and the Hare Part 3: The Consequences

April 15, 2025 by Keith Barros | IS&T

Recap of Part 2: Shelby received a suspicious email and reported it to the InfoSec team, who confirmed it was a phishing attempt. Bugsy, on the other hand, received a phishing email and fell for it, compromising his account and computer. That night, while Bugsy slept, alerts were going off in the university’s Security Operations

Beware of Fake Check Scams Targeting Students

April 4, 2025 by | IS&T Announcements

Recently, a sophisticated scam involving fake checks has targeted Chapman University students. The scammer poses as a faculty member, such as “Professor Chris Bolduc,” and reaches out to students via text. The email based variant of this scam is detailed on the trending email scams page. Here’s a detailed look at how this scam unfolds

Cybersecurity Through the Eyes of the Turtle and the Hare. A 3-Part Story Part 1: The Tale of Two Employees

March 31, 2025 by Keith Barros | IS&T

As the Chief Information Security Officer (CISO) for Chapman University, I’d like to share a compelling tale of two employees with contrasting approaches to their work and cybersecurity practices. In the ever-evolving cybersecurity landscape, the story of the turtle and the hare takes on a new meaning. This story highlights the importance of diligence and

Cybersecurity Awareness: Daylight Savings and Spring Break

February 28, 2025 by Keith Barros | IS&T

As the CISO for Chapman University, I want to highlight the importance of cybersecurity during March. With daylight savings time and spring break upon us, these events bring a change of pace and new opportunities. Still, they also present unique cybersecurity challenges we must be vigilant about. Here’s why maintaining strong cybersecurity practices is crucial

Annual Password Reset Reminders Are Coming Soon

February 10, 2025 by | IS&T

As part of our ongoing commitment to maintaining the security of our systems, the Information Sytems and Technology team (IS&T) will soon send email reminders for the annual password reset to Chapman University’s faculty and staff. Please keep an eye on your inbox for these notifications, which will provide you with all the necessary details

The Importance of Reporting Suspicious Cyber Activities and Emails

January 31, 2025 by Keith Barros | IS&T

As we navigate the digital landscape, the security of our information and systems at Chapman University remains a top priority. One of the most effective ways to protect our community from cyber threats is through vigilance and proactive reporting of suspicious activities and emails. As the Chief Information Security Officer (CISO) for Chapman, I want

Understanding AiTM Phishing Attacks A Guide for Regular Users

January 6, 2025 by | IS&T

What is AiTM Phishing? Adversary-in-the-Middle (AiTM) phishing is a sophisticated type of cyberattack where attackers intercept the communication between a user and a legitimate website. This allows them to steal sensitive information like passwords and session cookies, even if the user has enabled multifactor authentication (MFA). How Does It Work? In an AiTM attack, the attacker sets

Log In
Open Main Menu