Description
  
  
  
  
Phish TankPhish Tank
A collection of phishing scams that have attempted to bait the Auburn community.
Phish TankIn page navigation
2-Factor AuthenticationDUO
Auburn has implemented DUO as high-security login authentication.
2-Factor Authentication (DUO)In page navigation
SpirionSpirion
Enables Auburn employees to comply with protecting restricted data.
SpirionIn page navigation
IT Security TipsSecurity
Auburn sponsored security tips.
IT Security TipsIn page navigation
Mobile Device SecurityMobile Device
Auburn University's mobile device security requirements.
Mobile Device SecurityIn page navigation
PhishingPhishing
Phishing is an attempt to acquire personal information masquerading as a trustworthy entity.
PhishingIn page navigation
SANS Securing the HumanSANS
Each day more and more cyber threats are committed against institutions of higher education.
SANS Securing the HumanIn page navigation
Spyware/MalwareSpyware
Removal Tips, Tools, and Information.
Spyware/MalwareIn page navigation
Virus ProtectionVirus Protection
Everyone at Auburn University is expected to take precautions to protect their computers against viruses.
Virus ProtectionIn page navigation
VPN ClientVPN Client
A VPN provides a secure two-way communication tunnel to the Auburn University network.
VPN ClientIn page navigation
Case In PointCase In Point
Lessons for the pro-active manager
Case In PointIn page navigation
Project CleanupDelete
Improving security and minimizing risk through proper data management
Project CleanupIn page navigation
  infosec@auburn.edu  or    844-0888 with questions
  
  
  
William Miaoulis

​Each and every one of us needs to do our part to make sure that our online lives are kept safe and secure. That's what National Cyber Security Awareness Month (NCSAM) – observed in October – is all about!  For more information, go to the National Cyber Security Alliance.

Stay Safe Online

Published: 10/3/2017 4:29 PM
Category:
# Comments: 0
  
William Miaoulis

​To enhance the security of Auburn University and Student Information, Auburn continues to move to 2 factor authentication.  Single passwords are dying.  For more information visit: 2 Factor Authentication

Sign up today!

Published: 9/18/2017 3:08 PM
Category:
# Comments: 0
  
William Miaoulis

On September 7, 2017, Equifax, one of three major credit bureaus in the US announced a major security breach. Over 143 million records containing social security numbers, birth dates, addresses, and credit card numbers were stolen.

Equifax has posted the latest information at https://www.equifaxsecurity2017.com. The entire Progress Update, Consumer Notice, and Frequently Asked Questions (FAQs) should be read before taking any action.

Contained on the Consumer Notice tab is a list of other credit agencies for your consideration. These are “pay-for-service” providers www.experian.comand www.transunion.com). There are others such as www.lifelock.com (fee) and www.creditkarma.com (free). Before you subscribe to any service you should read the terms and conditions. Auburn University does not endorse any specific product.

The Equifax site also offers tips for protecting yourself against identity fraud and credit fraud.

  1. Consider freezing your credit report to prevent fraud.
  2. Monitor your bank and credit card activity carefully.
  3. Review your credit report often.
  4. Notify law enforcement if you find fraud.

Protect Yourself: Identity Theft

Identity theft seems to always be in the news. Regularly checking your credit report can help you detect signs of identity theft. Consumers have tools they can use to assist them in protecting their credit information. The Federal Trade Commission has an excellent website with helpful ways to protect your identity.

Report identity theft and get a recovery plan

If you have become the victim of identity theft, one place to start is IdentityTheft.gov. This website will lead you through the process of reporting and offers steps you can take if you are a victim.

Published: 9/13/2017 3:14 PM
Category:
# Comments: 0
1 - 3Next
Retrieving Data
Retrieving Data