Knowledge relating to how to protect IT resources and college information.
When surfing the Internet you may encounter a pop up that asks the user if they wish to show notifications for the website. If the user accepts these notifications, the site can then begin pushing notifications to any tab open in the browser, as well as your computers system notifications. These notifications can mask themselves as serious issues like an anti virus expiring, a virus being detected, or a hardware failure within your computer.
The Cybersecurity training module is a required module for all staff members that uses real world simulations to educate and test a staff members ability to spot common place scams.
Travelling with electronic devices can be costly in terms of roaming charges, and poses a security risk to the device, the information stored and transmitted by the device, and your login credentials.
Secure files in a password-protected “.zip” file using 7-Zip for Windows.
AES Crypt is an open-source application that provides file encryption. AES Crypt is available for Windows and macOS.
Phishing is the practice of sending of sending fraudulent emails that pretend to be from reputable brands/sources, these emails are designed to steal personal information. This article will show you how to report these emails.
Using sensitivity labels helps to clearly identify the amount of risk and care that must be taken when handling data. Each sensitivity level has associated handling instructions for things such as labelling, access control, storage and email restrictions.
Office 365 Message Encryption (OME) is a service built into Microsoft 365 email at Fleming. It enables you to securely send encrypted emails to internal and external recipients through an email message. Both the body of the email and any attachments are encrypted.
1Password is a password manager, digital vault, random password generator, and form filler.
"Phishing" refers to type of social engineering attack that attempts to steal sensitive information such as usernames, passwords, credit card numbers, and bank account information.
Staying safe well using the Internet is one of the most important things you can do. A big part in staying safe online is protecting your personal information. Your personal information includes things like your full name, address, birthday, social insurance number, and login credentials.
Keeping this information secure is one of the most crucial things you can to keep yourself safe online. This article will discuss some key steps you can take to help keep your personal information secure.
Password is an incredibly useful service that can be used as a password manager, digital vault, random password generator, and form filler. A key feature of 1Password is its OTP (one-time password) uses. This feature allows for shared accounts that have MFA (Multi-factor Authenticaion) enabled, that you don't wish to tie the account to a single users mobile authenticator or SMS number.
Working remotely is a flexible work arrangement where an employee is scheduled to perform work at an alternate work site. When working from home there can be many complications or issues. This article serves to provide important information that will make your work from home experience as seamless as possible.