Search 8 Results
Can't Find What You Are Looking For?
Sign In Now
You are currently not logged in and some search results only show up if you login.
You are currently not logged in and some search results only show up if you login.
What is multifactor authentication and why is it important?
becybersmart ... What is Multifactor Authentication
Multifactor authentication (MFA) is an electronic authentication method that requires the user to provide two or more verification factors to gain access to a
Why keeping your software up to date is important for cybersecurity?
becybersmart ... Software updates are essential for maintaining the security and performance of your devices and applications. They can protect you from cyber threats, improve your user experience, and ensure
Travel Tips for Cyber Security
becybersmart ... Advice
These guidelines are to help you while traveling, especially abroad. They are not intended to be legal advice. If you will be traveling to a country which you believe may be a high risk for
Technology and Device Security Essentials
becybersmart ... property as well
Do your part, BeCyberSmart!
Defend your Accounts and Devices
Don’t use a U of I password on any other sites
Use a password manager (like Keepass, 1Password, or Lastpass
Safe Online Shopping
becybersmart ... Stay safe, Vandals! Remain vigilant for hackers, scammers, and online thieves are trying to steal your personal and financial information while you shop, especially during holiday season. To help keep
Cyber Safety Tips
becybersmart ... 1. Avoid Phishing scams
Take a pause – don’t open an email when it first arrives – malicious messages are sometimes cleaned up after delivery
Emails that create a sense of urgency or seem too
Email Phishing FAQ
becybersmart ... Request security assistance
Will Information Technology Services ever ask for a password?
No! You will never be asked to provide private information by email including any of your account
How do I report a phishing message?
becybersmart ... Overview:
If you receive a suspicious message, you can report it as suspicious. The OIT Security team will analyze the message and provide you with confirmation if the message is safe or not