Search9 Results

On March 1, 2023, the White House published an updated National Cybersecurity Strategy. The newest strategy is significant for many reasons. The federal government has learned many lessons in the past 20 years from dealing with malicious nation state actors, widespread criminal activity, and overt election interference. Public/private partnership efforts undertaken since the first strategy release, have also clearly informed this newest strategy in some insightful ways.
As with anything easy and convenient, attackers have started manipulating the push notification process using a technique called “MFA Fatigue”.
What do phishers, scammers, criminals on the internet want? Increasingly they want user credentials.
Newer devices support newer operating systems and provide additional security features built into the hardware. It's important to stay up to date in order to get the best protections.
Rarely do I hear the word “strategy” when talking with colleagues about cybersecurity issues and solutions. Usually, we are talking about products designed to address weaknesses in technology or the configuration settings of various services. For this month’s article, I will spend a little bit of time exploring what a strategy is and why the NYS Cybersecurity Strategy is important to consider.
What is cybersecurity and how do we practice it? People often envision MIT graduates surrounded by burritos and Red Bulls furiously typing away on a Cray supercomputer. It’s the stuff of TV shows and movies. They pause ever so often to converse in the inscrutable language of computers. Then it’s right back to furious typing long into the night. The reality of cybersecurity, the most important aspects of it, are very different. Information Technology presents risks. We all have a role to play in
What is social engineering and how do we detect it?
Recently SUNY Brockport experienced an account compromise leading to a campus wide phishing email. It was quickly reported to BITS and our office responded quickly to regain control of the account and assess what happened.
Discover the power of password managers! Learn how Bitwarden, 1Password, NordPass, Keeper, Dashlane, Total Password, and KeePass can fortify your online security. From generating strong passwords to cross-device syncing, these tools offer convenience without compromising safety. Protect your digital world today.