TECHNOLOGY SERVICES
CyberSecurity Information
- Cybersecurity Tips
- SANS OUCH! Cybersecurity Newsletters
BACK TO ALL DEPARTMENTS
SANS OUCH! Cybersecurity Newsletters

Atrificial Intelligence - The Basics You Need to Know.
Disposing of Your Mobile Device - Tips on what you should do before you get rid of that old device
Going on Vacation? Simple Steps to Make it Cybersecure - Vacation tips to keep you CyberSafe!
How to Outwit Malicious Mobile Apps! - Tips on determing whether a mobile app is safe or not!.
Identify Theft: Preventing, Detecting, and Responding - Tips on reducing your exposure to identity theft!
I've Been Hacked, Now What! - Tips on recognizing if you have been hacked and what to do.
Messaging Do's and Dont's - Hints and tops on various types of messaging applications.
One Simple Step to Securing Your Accounts - 2 Factor Authentication
Online Security for Kids - Simple tips to help keep kids safe online.
Passphrases vs. Passwords - A brief explaination
Phishing Scams - How to avoid that phish!
Phone Call Attacks and Scams - what they are and how to handle them
QR Codes! - what are they and why can they be dangerous!
Securing Your Mobile Devices - Tips on securing your mobile devices.
Smart Home Devices - Tips on securing your smart home.
Smart Home Devices: Lock Them Down Before Cyber Criminals Do! - Tips to lock down those smart home devices!
Stop that Malware - What it is and how to help stop it.
Stop Those Phone Call Scams - Tips on reducing the number of scam phone calls you receive.
Text Messaging Attacks - A Smishing Saga - Tips on Spotting and Stopping Smishing Attacks.
The Power of Passphrases - Why use a password when you can use a Passphrase!
The Power of Password Managers - Why you should use a password manager to organize and track your passwords.
The Power of Updating - Why you need to keep your systems and software up to date.
Top Cybersecurity Tips for Vacations - Suggestions on keeping cybersafe while on vacation
Top Three Ways Cyber Criminals Try to Attack You! - Discussion on Smishing, Vishing and Phishing.
Two Factor Authentication - Protect your online presence
Unveiling the Shadows: How Cyber Criminals Steal Your Passwords - Insight into how your passwords may be stolen.
Voice Cloning Attacks - Defend Against Voice Cloning Attacks
Yes!  You are a Target - Why your on-line accounts have value and tips on how to protect them