Tax season is nearing the end for this year and bad actors are still out there trying to scam individuals with a variety of methods and impersonating the Internal Revenue Service. Keep these items below in mind when filing your tax return and be on the lookout for potential tax scamming.
by Laura Geringer
UTO Humble Heroes: Brett Woods + the Information Security Team, Alyssa Goldstein, Robert Kamilli, Kevin Lough, Sean Reichert and TJ Witucky
Just like in real life, our digital lives can become cluttered and messy if we don’t take care to clean up now and then. Additionally, removing files that could contain sensitive information can protect you from attackers - hackers can’t steal what isn’t there! Downloaded files, unneeded applications, and old documents are all examples of items that should be removed periodically.
If you don’t need it, delete it! We’re all busy but these 5 tips will save you time and effort in the long run.
As we move into spring 2019, information security experts have pinpointed several emerging trends that we can begin preparing for today. Some of these trends are picking up steam, while others are emerging technologies. By way of two sources, Information Security Buzz and Information Age, here are some of the more notable examples.
Today, everything is shared on social media. With so much information circulating around the internet, it’s only natural that bad actors seek to use it and take advantage of unsuspecting users. Information that you may share voluntarily can sometimes be used to get to private information. For example, cyber criminals can use your “likes” to deduce a password or security question.
It is important as consumers to be aware of everything that we buy and use. This is true for a car, phone, or even an app. It can be difficualt to understand what a person is agreeing to when using or buying a new product. Many companies have complex terms in their agreements (End User License Agreement or Terms and Conditions). Most consumers don't read the agreements and just accecpt them. There are new laws that are forcing companies to develop ways of notifying end users of these agreements, but consumers should still educate themselves on how their data is being used.
Data privacy is such an important topic that it gets its own international day each year! On January 28, Data Privacy Day recognizes the need for personal data and privacy protection practices. As technology enhancements come at a breakneck pace, we all live technology-enhanced lives with each new app or IoT gadget. These new tools provide tremendous value to our lives, however it becomes vitally important that we understand how the data it collects is used.
Phishing is always on our radar here at ASU. It remains the #1 successful attack vector for hackers to get your personal information year after year. Understanding the social engineering schemes of phishing is key; rather than “break into” your accounts or information, these attackers find it’s easier in many cases just to ask you for your information.