ϳԹ

Skip to main content

cybersecurity

cybersecurity
Hero Type
Image
“How ChatGPT Can Fool Cyber Security Systems”
Are your organization's cyber security systems safe? Can they stand up to threats from artificial intelligence and ChatGPT? An organization's cyber security system is the internet-connected system incorporating hardware and software that stands between employees/customer data and cyber attacks. Art...
cybersecurity
Hero Type
Image
Ongoing phishing simulation program helps faculty and staff identify and avoid malicious phishing emails
As announced last fall, ϳԹ launched a new program to help employees avoid falling victim to phishing emails. The program will continue during the 2023–24 academic year. Phishing is a global problem that grows more challenging as criminals invent new forms of deception. ...
Typing
Hero Type
Image
4 steps to take if your account has been hacked
Picture this: You're going about your day when you receive an "urgent" direct message telling you to verify an online account before it's "suspended." Or, you're scrolling through your phone and notice an unfamiliar text (or call) sent from your device. Both scenarios are examples of phishing, a fra...
computer-science
Hero Type
Image
4 ways to protect your online identity
Imagine you’re going about your day when all of a sudden, you’re notified that someone logged into your bank account. Or, you finally get a second to relax from a long day of classes, then you get a text that someone is using your identity for a fake profile on a dating app. These scenarios and othe...
GettyImages-1335882728-e1642611156166
Hero Type
Image
Get tips to protect your social media accounts
October is National Cybersecurity Awareness Month and University Technology’s ([U]Tech) Information Security Office has compiled tips for members of the ϳԹ community to keep in mind regarding social media use and data privacy. Though social media platforms like Twitter...
laptop-financials
Hero Type
Image
Learn how to protect yourself online during World Password Day
Passwords protect our digital identities and private data by acting as gatekeepers to the cyber world in which we live. Having weak, easy-to-guess, or re-used passwords puts you at risk of becoming a victim of cyber criminals. To learn how to keep your health, financial and other information safe,...
womanworkinglaptop
Hero Type
Image
Prioritizing cybersecurity in a hybrid workplace
This month, University Technology’s ([U]Tech) Information Security Office is marking National Cybersecurity Awareness Month by sharing information on different facets of cybersecurity. The boundaries between work life, home life and student life today are becoming harder to see at Case Western Rese...
Womanonlaptop
Hero Type
Image
Cybersecurity Awareness Month: Tips to follow
This month, University Technology’s ([U]Tech) Information Security Office is marking National Cybersecurity Awareness Month by sharing information on different facets of cybersecurity. Whether you’re looking for a new job opportunity, sending a message out to members of a Google Group, or looking f...
GettyImages-659493016
Hero Type
Image
Cybersecurity Awareness Month: Phishing defenses
This month, University Technology’s ([U]Tech) Information Security Office is marking National Cybersecurity Awareness Month by sharing information on different facets of cybersecurity. Phishing (pronounced “fishing”) is a technique cybercriminals use in order to “fish” for personal or proprietary i...
computer-science
Hero Type
Image
Cybersecurity Month: Protect your online presence
Cybersecurity Awareness Month, held annually in October, is a chance for the ϳԹ community to renew our commitment to online safety and device security habits. To that end, the National Cyber Security Alliance has established the theme for this month as “Do your part. #Be...