Community Interest

CSS Class: 
Default News Image: 
Two students working together on a computer.

Don't Need It? Delete It!

Just like in real life, our digital lives can become cluttered and messy if we don’t take care to clean up now and then. Additionally, removing files that could contain sensitive information can protect you from attackers - hackers can’t steal what isn’t there!  Downloaded files, unneeded applications, and old documents are all examples of items that should be removed periodically.

If you don’t need it, delete it! We’re all busy but these 5 tips will save you time and effort in the long run.

Social Media Practices

Today, everything is shared on social media. With so much information circulating around the internet, it’s only natural that bad actors seek to use it and take advantage of unsuspecting users. Information that you may share voluntarily can sometimes be used to get to private information. For example, cyber criminals can use your “likes” to deduce a password or security question.

Control Your Location

It is important as consumers to be aware of everything that we buy and use. This is true for a car, phone, or even an app. It can be difficualt to understand what a person is agreeing to when using or buying a new product. Many companies have complex terms in their agreements (End User License Agreement or Terms and Conditions). Most consumers don't read the agreements and just accecpt them. There are new laws that are forcing companies to develop ways of notifying end users of these agreements, but consumers should still educate themselves on how their data is being used.

Data Privacy Day

Data privacy is such an important topic that it gets its own international day each year! On January 28, Data Privacy Day recognizes the need for personal data and privacy protection practices.  As technology enhancements come at a breakneck pace, we all live technology-enhanced lives with each new app or IoT gadget. These new tools provide tremendous value to our lives, however it becomes vitally important that we understand how the data it collects is used.

Phishing Reminder

Phishing is always on our radar here at ASU. It remains the #1 successful attack vector for hackers to get your personal information year after year. Understanding the social engineering schemes of phishing is key; rather than “break into” your accounts or information, these attackers find it’s easier in many cases  just to ask you for your information.