Elon Technology Blog

5 Tips for Blocking Hacker Attacks This Cyber Monday

Christmas tree and giftsThe holiday season has arrived! While this is a perfect time to get great online deals, this is also the time when scammers and hackers take advantage of the increase in online transactions to steal personal information. Scammers often use social media, email, and text messages to trick you into giving away your personal information by getting you to click on links disguised as sales. Usually the links appear to come from a legitimate source, however clicking on them takes you to a malicious, but real-looking, page asking for your personal information. Today, we’ll share a few ways you can spot shopping scams and keep your personal information safe.

Ask yourself these quick questions before buying online this holiday season:

Question 1: Are my apps and web browsers up-to-date?

Apps and web browsers are updated regularly to add new features and address any security vulnerabilities. Before making a purchase make sure everything has the latest updates so you can benefit from any new security improvements.  (How to update apps: Android and Apple.)

Question 2: Do I trust this website with my personal information?

Does the site have a small padlock symbol in the address bar area of the web browser? Does the website address begin with https://? Both of these indicators let you know the site is secure. It is especially important to see these when you are entering passwords, credit card numbers, or other sensitive data, as it ensures that your data is encrypted when sent across the internet.

Question 3: Is my internet connection secure?

Know what network your device is connected to before you click “checkout” to purchase items. Did you have to enter a password to gain access to the network the first time you tried to connect? If so, that’s typically more secure than an open, public wifi connection. Public wireless hotspots at coffee shops and airports are convenient, but since they are publicly available, they are not secure enough to protect others from stealing your data across the network. Keep in mind that when you checkout online, you’re sending your address and credit card information across a wireless network that others are also using. These days, it doesn’t take hackers much to tap into that data and use it for their own gain. When possible, try to limit your use of free wireless networks for just casual browsing.

Question 4: Which payment method should I use?

Use extreme caution with websites or apps that only accept checks, wire transfers, or money orders as the forms of payments.  Cards are preferable, but consider using credit cards over debit cards as they generally provide better buyer and fraud protection if your account is breached and you need to dispute charges.  Review your account statements often to make sure the only transactions listed are the ones you authorized.

Question 5: What else can I do protect myself from while shopping online?

Online marketplaces like Amazon and eBay not only sell products themselves, but also offer products sold and shipped by third-party sellers. Before making a purchase on these sites, take a few minutes to look at comments and reviews to see how others rate the seller and quality of the product. If you see a lot of negative reviews (or no reviews) you may want to shop around for a different seller. Also, be sure to check for the seller’s contact information, such as a phone number or address, in case you have issues and need to coordinate a return or refund.

You should also take some time to check your password habits. Are you using a unique password for each account, especially for banking and other important sites? If not, you could be at risk of a hacker cracking your outdated password and accessing your accounts. Learn more about improving your passwords.

 

Online shopping can make the holidays merry and bright when you are doing everything you can to make secure purchases. Use these tips to stay safe this holiday season and be sure to check out #ElonSecure on Twitter for more cybersecurity tips!

 

 

 

Posted in Technology@Elon, Security and Safe Computing | Tagged , , | Leave a comment

Takeaways from National Cyber Security Awareness Month 2017

National Cyber Security Awareness Month logo

Every October, businesses, organizations, and individuals from around the work come together and participate in National Cyber Security Awareness Month (NCSAM) to promote online safety and cyber security awareness. This month, Elon’s Office of Information Technology has worked together to help make online safety approachable and accessible with weekly cyber security articles and quick tips for staying safe online.

Here are the main takeaways from each week of NCSAM:

Cyber Security 101

A major theme in this year’s National Cyber Security Awareness Month included sharing that it is not difficult to stay safe from the threat of cyber attacks. Throughout the month, we highlighted simple tips for keeping your information safe on the web, including how to create strong passwords, learning to spot email scams, and how to regularly backup your device.

Creating a Culture of Cyber Security in the Workplace

There are many ways for hackers to steal data in the workplace which we brought to light in Week 2 of NCSAM. For example, sharing information online over an unsecure WiFi network or leaving your computer unlocked while away can compromise the privacy of your personal information. However, there are many ways for you, as an employee, to protect personal and professional information. Locking your devices with a password, changing your password regularly, and avoiding links from unsolicited emails are a few simple measures to protect data, prevent identity theft, and stop cyber attacks in the workplace.

Securing Smart Devices

Smart devices allow us stay connected and updated on what is happening around the world while also monitoring our activity and saving our personal information. While smart devices can improve our everyday lives, it is important to remember that they are still at risk of cyber hacks. To stay safe while using smart devices, be sure to set up two-factor authentication, update your devices’ software regularly, and personalize your usernames and passwords.

 

Although National Cyber Security Month is coming to a close, there are still many ways to stay informed and involved with cyber security. Check out Stay Safe Online to learn more about how you can make the internet more safe and secure for yourself and others online. You can also follow @StaySafeOnline on Twitter and join the #NCSAM conversation to stay on top of cyber security news.

Check out all the National Cyber Security Month articles here on the Elon Technology Blog, and look for #ElonSecure on Twitter for more security tips!

 

 

Posted in Technology@Elon, Tech Tips, Security and Safe Computing | Leave a comment

Securing smart devices and protecting personal information

Photo of smart home connected to devices

Source: asurion.com

We live in a world of smart cities, connected devices, and digitized records. Smart devices allow us stay connected and updated on what is happening around the world, and help us keep up with our fast-paced lives. Although smart devices are immensely useful, they are fueled by our personal information, which can be dangerous. By providing your smart devices with information like your shopping preferences or address, they are able to monitor your activity and save personal data. For example, some connected devices, such as the Echo and Alexa, work by listening to audio cues and spoken phrases to provide their users with a helpful responses. These devices can help us create a shopping list, call a loved one, play our favorite song, and more, but as they are always listening and monitoring what we say, it can be difficult to know how to protect our information from security threats. With this in mind, it is important to understand how to use these cutting-edge devices in a safe and secure way.

 

What is the Internet of Things (IoT)?

The Internet of Things (IoT) refers to devices that can connect to the internet while collecting, analyzing, and sharing data. A few examples of IoT devices could be:

two people playing video gamesphoto of smart watchGPS system in a car

 

Fitness tracking device

 

 

 

 

 

 

 

 

 

 

 

 

While smart devices are useful for monitoring and improving our everyday lives, it’s important to keep in mind that they are still susceptible to potential security breaches and hacks. Here are some simple ways to keep your information safe while using smart devices:

  • Set up Two-Factor Authentication
    • Two-factor authentication means going beyond creating a username and password and also providing additional authentication information sent to you from a separate device. For example, when logging into Twitter, there is an additional code sent to your phone that is needed to log in on your computer. This way, even if someone knows your password, you are the only one able to log into your account.  Many devices and apps have this built-in these days, but be sure to enable it for all accounts/apps when possible.
  • Keep your devices and apps up-to-date
    • When an official software update becomes available for your app or device, download it! These updates often contain security patches and bug fixes to prevent potential security issues.
  • Personalize usernames and passwords
    • Most devices come with a default username and password that hackers can easily crack. For example, most wireless routers have login credentials on a sticker on the back of the device which can easily be accessed and is not private. Be sure to create a secure username and password that only you know.

 

Although smart devices can threaten our data and security, they can make our lives easier and there are many simple ways to use these devices safely. Along with taking precautionary measures such as using two factor authentication, updating your device, and creating personalized usernames and passwords, it is important to be smart and cautious while using these devices.

 

For more cybersecurity tips. check out last week’s article here on the Elon Technology Blog, and stay tuned next week for a National Security Month recap article! Don’t forget to look out for #ElonSecure on Twitter for even more tips.

 

Posted in Technology@Elon, Tech Tips, Security and Safe Computing | Comments Off on Securing smart devices and protecting personal information

Creating a Culture of Cybersecurity in the Workplace

Man using laptop computer

Data breaches are increasing every year and hackers are getting more advanced as security systems improve. Because of this, there are many ways for hackers to steal data in the workplace including when you share information online over an unsecure WiFi network or leave your computer unlocked. Fortunately, there are many ways for you, as an employee, to protect personal and professional information.

Here are a few simple measures to protect data, prevent theft, and stop attacks in the workplace:

  • Be aware of the people around you
    • Be mindful of the people around you while working in public spaces such as coffee shops or a library. For example, people may be standing behind you or looking over your shoulder while you’re typing in credit card information or viewing sensitive documents. 
  • Lock all devices with a password
    • Having a passcode on your phone and computer can stop a thief from accessing your personal photos, emails, data, etc., if your devices are stolen. Passcodes can also protect your data when you are away from your computer, tablet, or phone.
  • Change your password every few months
    • Changing your password frequently will help protect you against phishing sites and viruses that may attack your computer or other devices. 
  • Do not click on links contained in unsolicited emails
    • If you’re not expecting an email or attachment from a sender, simply don’t open it. Suspicious emails or attachments may contain viruses or phishing scams targeted to capture your personal information.
  • Do not share sensitive information over email
    • Hackers can easily steal information from your email, so please avoid sharing confidential or personal information via email when possible.
  • Clear your desk of all sensitive work and personal documents
    • Do not leave paperwork or post-it notes with sensitive information on your desk as people walking by could easily view that information. For example, passwords, personal employee data, and confidential information should be kept private and inaccessible from people walking by or visiting your desk. 

Employees play a major role in maintaining security in the workplace and must know the basics of preserving data security and spotting possible breaches. Fostering a culture of cybersecurity focuses on strengthening employees’ understanding of security issues and how their actions can help or hurt the company’s security.

 

Check out last week’s article here on the Elon Technology Blog, and stay tuned next week to learn about the risks of using smart devices! Don’t forget to keep up with National Cyber Security Awareness Month by looking for #ElonSecure on Twitter!

 

Posted in Technology@Elon, Security and Safe Computing | Comments Off on Creating a Culture of Cybersecurity in the Workplace

Information Technology recognized during National Customer Service Week

Ryan Gay and IT student worker, Katie Shifflette, answering technology questions at College Coffee.

Ryan Gay and IT student worker, Katie Shifflette, answering technology questions at College Coffee.

Information Technology is proud to highlight the exemplary customer service provided by the department’s staff during National Customer Service Week.

 

Service with a smile

When it comes to offering customer service, the employees of Information Technology (IT) strive to offer faculty, staff, students, alumni, and retirees the best experience possible. From troubleshooting issues, to creating new applications and sites, to assisting faculty in integrating technology into their pedagogy, the IT staff is constantly solving new problems to help the Elon community daily.

Offering excellent customer service isn’t unique to IT. It is prevalent throughout Elon in the work that all employees, both professional and student staff, provide to the campus community. To celebrate outstanding customer service, the International Customer Service Association (ICSA) established National Customer Service Week.

 

What is National Customer Service Week?

Celebrated each year during the first full week of October, National Customer Service Week is an opportunity to celebrate customer service professionals and highlight the important work they perform. Originally started in 1984, National Customer Service Week was proclaimed a national event by Congress in 1992, thanks to the help of Former U.S. Senators Robert Dole and Nancy Kassebaum and U.S. Representatives Dan Glickman and Pat Roberts.

In addition to celebrating customer service professionals, the week also serves to emphasize the importance of offering excellent service to customers. According to John Kressaty, former ICSA president, another purpose of the week “…is to get the message across a wide range of business, government and industry that customer service is very important.”

 

What does customer service mean?

Customer service is present with everything IT does at Elon. Every staff member works with any number of University constituents to help them achieve their desired goal—whether it’s fixing a broken printer, creating a new web application, or figuring out a way to use new technology in the classroom.

“We understand that technology changes rapidly and is pervasive in our work as educators,” explained Assistant Vice President for Technology and Chief Information Officer, Christopher Waters. “We embrace a support model that is seamless in our community. The Office of Information Technology consistently adjusts our support strategy to meet the changing needs of our students, faculty, and staff. As a strategic partner with departments and offices, our goal is to listen and understand the need or innovation of our campus constituents.”

In fact, the staff in IT are extremely dedicated to making sure that those we work with have a positive experience.

“Customer service is going the extra mile to provide the customer with what they need,” explained Technology Service Desk student staff member, Janae Williams. “The majority of customers don’t come to Technology just to say hello. [At the Service Desk] many customers are experiencing issues that inconvenience them and the ability to do their job. But, we always do our best to get them to their desired resolution.”

Instructional Technologist, Sara Vanderpool, noted that IT staff strive to go the extra mile when working with customers.

“Customer service means being kind, patient, and a good listener,” she said. “It also means assisting the client until their problem is solved, their question is answered, or until you’ve pointed them to the person who can help. This may mean that you have to do things that are out of the scope of your job.”

 

How do we provide customer service?

IT staff provide customer service in a variety of ways. Several members spoke on how they strive to provide users with the best experience possible.

“You have to show willingness to help solve an issue,” explained Assistant to the CIO, Mel Brown. “You get the answers the customer needs and you follow-up with them.”

Service Desk Analyst, Ed Williams, noted that he always puts his best foot forward when working with users.

“I provide my best customer service skills—you have to be patient, communicate clearly, and inform them of what’s going on,” he said.

Janae Williams agreed, noting it’s important to stay positive in conversations (particularly when a user is frustrated) and sympathizing when things have gone wrong, like when a student’s hard drive has crashed.

Michelle Woods, Manager of the Technology Service Desk, added another layer.

“I give each customer my undivided attention and put forth my best effort to resolve their issue as quickly as possible,” she explained. “If I’m unable to resolve the issue, I ensure the customer that I will document the issue and get it to the appropriate area that will be able to provide a solution.”

 

The best parts of customer service

Certainly, there are difficult customer service experiences. People may be frustrated or not able to achieve their desired results, which can complicate things. However, the joy of being able to help others is what stood out most when discussing customer service.

“I love the fact that each user is unique,” Ed Williams said. “Each one needs to be addressed in their own way. I just really enjoy helping others. My favorite moments are when a user will call in and begin a conversation with, ‘I’m not tech savvy,’ or ‘Forgive me for taking up your time.’ I always respond: You know what? I’m here for you! You know, if I were attempting your job, I’m sure I’d need help, too!”

Vanderpool noted that what she enjoys most about providing users the best customer experience possible are the relationships.

“By providing the best customer service experience, I’m allowed to get to know the clients a bit,” she explained. “I am able to ask the client about their day or about their course, which allows me to further provide the best customer service I can.”

“I just enjoy helping people get the things they need,” Brown noted.

Learning how to provide customer service has also been beneficial for students in their experience at Elon.

“I believe that (we) want to leave a positive and lasting impression on the Elon community,” Janae Williams said. “I just enjoy how appreciative customers are when I provide great customer service. I’ve learned that I can directly impact how others feel for the remainder of their day. So, in my mind, I believe I’m helping customers feel better.”

 

Posted in Technology@Elon | Comments Off on Information Technology recognized during National Customer Service Week

Cybersecurity 101: 5 Quick Tips For Staying Safe Online

To kick off National Cyber Security Awareness Month, we’re sharing five simple tips for keeping your personal information safe from cyber attacks. While you may feel that you’re not at risk for a cyber attack, keep in mind that over 1.9 billion data records have been hacked during global cyber attacks in just the first half of 2017.  It’s even possible that your information has been hacked without your knowledge. Luckily, there are several ways to protect yourself from the threat of cyber attacks.

Here are 5 tips for staying safe on the web:

  1. Create secure passwords

    • Want to create a secure password and, most importantly, remember it? Check out LastPass, a password manager that will help you create strong passwords and remember them for you! Test your password strength and find out how secure your password is here!
  2. Lock your devices

    • Lock all of your devices with passcodes to keep intruders out. Even if your device is stolen, a passcode will stop the thief from accessing your personal photos, emails, data, and more.
  3. Look out for email scams

    • To avoid phishing scams and increase your email safety and security, don’t open attachments or links from senders you don’t know. Rule of thumb: If you’re not expecting an email or attachment from a sender, simply don’t open it.
  4. Keep personal information personal

    • Just like in real life, there’s such a thing a sharing too much information. Don’t post sensitive information to social media, such as your phone number or where you live. Also, be sure not to share private information over an unsecure public network, such as credit card information or bank logins.
  5. Backup your information regularly

    • Be sure to backup your data, contacts, files, photos, etc. in case your device is lost or stolen. Learn how to backup an Apple device here, or an Android here.

Beyond having a large scale impact on major corporations and databases, cyber attacks can impact our daily lives as well. Hackers can tap into emails with personal information, bank accounts, social media, and much more. Make sure to follow these quick tips and do your part in protecting your devices from viruses and hackers. To learn more, read next week’s article on cybersecurity in the workplace and follow #ElonSecure on Twitter!

 

 

 

Posted in Technology@Elon, Tech Tips, Security and Safe Computing | Comments Off on Cybersecurity 101: 5 Quick Tips For Staying Safe Online

NCSAM 2017: Cyber security is our shared responsibility

This October marks the 13th anniversary of National Cyber Security Awareness Month (NCSAM)!  Since its creation in 2004, NCSAM has been a respected source of cybersecurity tips and information for staying secure online. Be sure to join the conversation on Twitter and Facebook this month as Elon shares advice and resources for keeping your personal information safe. #ElonSecure

Continue reading »

Posted in Tech Tips, Security and Safe Computing | Comments Off on NCSAM 2017: Cyber security is our shared responsibility

Keeping your data secure when using cloud services

Cloud network graphic via LinkedIn

What are cloud services?

If you’ve ever streamed a show on Netflix or Philo instead of watching a physical DVD or VHS, you’ve used a cloud service.  The ability to access data from virtually anywhere and from any device is made possible by the use of cloud services. Thanks to cloud services, data can live on one or more servers, often called “the cloud,” instead of residing on just one device (like a computer, phone, hard drive or DVD).  Devices can connect to the cloud to access text files, emails, movies and shows, and more. Some well-known cloud services include Google Docs, Dropbox, and the Office 365 suite.

Here are just a few ways you’ve probably used cloud services:

  • Syncing the photos on your phone to an online file storage app, such as Google Drive or Apple’s iCloud
  • Collaborating with other people on a single Google Doc or Word Online
  • Typing a note on your computer and it automatically syncing with your phone
  • Sharing files with coworkers using Office 365 or Sharepoint.

Continue reading »

Posted in Technology@Elon, Security and Safe Computing | Tagged , , , , | Comments Off on Keeping your data secure when using cloud services

Hurricane Harvey disaster relief scams

NOAA’s GOES-East satellite captured this image of Tropical Storm Harvey over Texas on Aug. 27 at 10:30 a.m. EDT (1430 UTC).

While Hurricane Harvey has slowly begun to subside, the storm’s destructive effects will continue to be felt across Texas and surrounding areas for years to come. Unfortunately, when natural disasters strike, malicious cyber scammers consider this a prime time to capitalize on those wanting to help disaster victims. Donating money to disaster relief charities and other help organizations can be helpful for victims in need, however please be aware of fraudulent emails asking for money or credit card information to protect yourself from cyber scams.

Emails requesting donations from deceptive charitable organizations may appear over the next several days, weeks, or even months. Fraudulent emails often contain links or attachments that are directed to malware-infected or phishing websites. Exercise caution when handling any email with a subject line, hyperlinks, or attachments related to Hurricane Harvey, even if it appears to come from a trusted source.  Verify the legitimacy of any email solicitation by contacting the organization directly using a trusted contact phone number.

Before giving to a charity, consider these tips advised by the Federal Trade Commission to avoid any charity or fundraiser that:

  • Refuses to provide detailed information about its identity, mission, costs, and how the donation will be used.
  • Won’t provide proof that a contribution is tax deductible.
  • Uses a name that closely resembles that of a better-known, reputable organization.
  • Thanks you for a pledge you don’t remember making.
  • Uses high-pressure tactics like trying to get you to donate immediately, without giving you time to think about it or do any research.
  • Asks for donations in cash or asks you to wire money.
  • Offers to send a courier or overnight delivery service to collect the donation immediately.
  • Guarantees sweepstakes winnings in exchange for a contribution. (By law, you never have to give a donation to be eligible to win a sweepstakes.)

If you’d like to help victims of Hurricane Harvey, check out this list of reputable organizations where you can get involved.

Tips for Email Security:

  • Do not click links in unsolicited email messages
  • Use caution when opening email attachments
  • Check out these articles on the Technology Blog to learn more about malware and email phishing schemes.

 

Image credit:  NASA/NOAA GOES Project

Posted in Tech Tips, Security and Safe Computing | Comments Off on Hurricane Harvey disaster relief scams

5 Moodle tips to start the semester

Image of a start lineIt’s time to get your Moodle courses ready! Here are five helpful (and short) tutorials for building your Moodle course at the start of the semester.  Continue reading »

Posted in Instructional Technologies, Moodle | Comments Off on 5 Moodle tips to start the semester