11 posts tagged

information security

  

Don’t Get Phished! CSAM: Week 3 Recognizing and reporting Phishing

October 12, 2022 by | IS&T

What is a phishing attack? Phishing is a form of social engineering. Phishing attacks use email or malicious websites to solicit personal information by posing as a trustworthy organization. For example, an attacker may send an email seemingly from a reputable credit card company or financial institution that requests account information, often suggesting that there

Cybersecurity Awareness Month is Here!

September 21, 2022 by | Technology

In 2004, the US Congress and the President of the United States established October as Cybersecurity Awareness Month to raise awareness about the increasing number of threats that can affect the country’s technology and personal data. Through a collaboration between government agencies and industry, the Cybersecurity and Infrastructure Security Agency (CISA) and the National Cybersecurity

Creating a Strong Password: The First Step in Protecting Your Data

September 14, 2022 by | Technology

One of the most critical factors you should consider when protecting your online accounts is having strong passwords. Without it, you could be giving cybercriminals access to your accounts without even knowing! Your account credentials are a tempting target for bad actors on the internet, and to avoid becoming a victim of password hacking, you

Announcement: Adobe Flash (End-of-Life) Removal

June 30, 2022 by | Software

Both Software and Hardware have a “life cycle” that is determined by the developer/manufacturer. When a product reaches the end of its life cycle, it becomes “end-of-life,” at which point the developer no longer maintains the software and does not issue future security updates. Since December 31, 2020, Adobe has stopped distributing and supporting Flash.

Introducing Fischer Identity Management System Coming soon!

June 6, 2022 by | Software

Identity management, otherwise known as identity and access management (IAM), is an identity security framework that authenticates and authorizes user access to resources such as applications, data, systems, and cloud platforms. Chapman’s current IAM system, although effective, is expensive to maintain due to the complexity of the solution. The university’s IAM system was not designed

Cyber Attack on Pulse VPN Services What is the impact for Chapman University?

April 21, 2021 by | Uncategorized

On Tuesday, April 20th, several news and security organizations announced the existence of an ongoing attack against Pulse Secure VPN appliances around the world. Previously undisclosed vulnerabilities were identified as being used to compromise credentials and access company networks. IS&T has already completed a precursory review and found no evidence of infiltration of our VPN

Log In
Open Main Menu