Take Action Today!

 

ASU Information Security Office

ASU Information Security Office's Mission:
 
Arizona State University’s Information Security Office is committed to preserving the availability, confidentiality, and integrity of its information resources while preserving and nurturing the open information-sharing requirements of its academic culture.

ASU Information Security Office's Vision:

  • Embed information security into the culture of ASU
  • Ensure alignment of the information security program to the University's mission
  • Increase visibility into the University’s security posture

Read More

2018 IT Risk Assessment Toolkit

Resources for addressing Risk Assessment corrective actions.

  • US-CERT Current Activity:
    The US-CERT Current Activity web page is a regularly updated summary of the most frequent, high-impact types of security incidents currently being reported to the US-CERT.
    http://www.us-cert.gov/ncas/current-activity/
  • Internet Crime Complaint Center (IC3):
    The Internet Crime Complaint Center (IC3) is an alliance between the National White Collar Crime Center (NW3C) and the Federal Bureau of Investigation (FBI). IC3’s mission is to address crime committed over the Internet.
    http://www.ic3.gov/media/default.aspx
  • Microsoft Security Bulletins:
    Microsoft security bulletins provide information & news about computer vulnerabilities and security updates to keep your computer protected.
    http://technet.microsoft.com/en-US/security/dn481339
  • Apple Security Updates:
    This document outlines security updates for Apple products.
    http://support.apple.com/kb/ht1222
  • Oracle Critical Patch Updates, Security Alerts and Third Party Bulletin:
    This page lists announcements of security fixes made in Critical Patch Update Advisories and Security Alerts, and it is updated when new Critical Patch Update Advisories and Security Alerts are released.
    http://www.oracle.com/technetwork/topics/security/alerts-086861.html

Protecting Against Phishing

What is Phishing?

Phishing, in a nutshell, is the online version of a con-job. The perpetrators of phishing messages are essentially tech-savvy con-artists. In a phishing scam, these con-artists send out messages and emails that "look" legitimate, hoping to trick the unsuspecting user into giving out their personal information, including usernames and passwords, and allowing the perpetrator to conduct identity theft.

Read more

How The Internet Works

Submitted by meroman1 on July 18, 2018 - 2:48pm

We use the internet every day, but how many of us actually know how it works? The complicated “World Wide Web” is built on a series of universal truths and technology, and knowing how it works will help you improve your information security.  If you are up for learning a little bit more, you’ll be able to better protect yourself and your family.

Credit Card Skimmers Still Popular At The Pump

Submitted by meroman1 on July 18, 2018 - 2:47pm

You may have noticed that most every bank has issued credit and debit cards with “chip” technology that is meant to prevent credit card “skimming,” which steals information from the card with a swipe. It’s the reason why most every store has a pad that beeps angrily at you if you don’t take out your card quickly enough. This chip technology has been generally effective (although there have been issues with it), but there are a few places where it hasn’t yet come into play; specifically, gas stations.

Bluetooth: Another Avenue For Hackers

Submitted by meroman1 on July 18, 2018 - 2:41pm

Bluetooth-enabled devices have become a common fixture in our everyday lives. We connect our phones and smart devices to speakers, headphones, TVs, and more. Bluetooth enables more frequent and simpler connections to devices, further increasing the number of internet-connected devices that provide amazingly valuable services by communicating to each other in an increasingly complex web of devices and services.