Search10 Results

Social media has many advantages, but can be a gateway for bad actors to gather information. This article provides some guidance on how to safely navigate social media platforms.
QR codes are extremely popular ways to get people to navigate on mobile devices to sites without having to provide long URLs. However this can lead to being duped into inputting personal information into fraudulent sites. This guide sheds light on scam avenues and how best to avoid them.
Sometimes the easiest way for bad actors to gain information on someone it to do some simple searching and get it from their own digital presence. People often give away valuable information in routine posts or discussions. This guide will highlight some of the more common avenues bad actors take to gather this information and steps you can take to avoid them.
Tips and tricks for keeping your devices and information safe from malicious attacks.
USB is the most common type of connector on devices today. However this standard provides bad actors with the ability to possibly compromise your devices. These tips are provided to help educate everyone on how to avoid risks associated with USB ports and devices.
Securing your physical spaces is incredibly important as it can be an easy to way for a bad actor to gain access to secure information. This guide provides tips and tricks to help prevent information from being harvested for a workspace.
Technology alone can't always protect our computers and information. Being aware of information security issues and following best practices are the surest way to protect yourself, your family and the Framingham State community.
When evaluating potential employment, you must be careful to avoid scams and fraudulent postings. While Framingham State University makes every attempt to block them, scammers constantly find new ways to bypass the system. Learn more about employment scams and how to be vigilant.
Ransomware is a type of malicious software (a.k.a malware) that locks the victim out of their computer or files – often by encrypting them – until a ransom is paid. Learn more about ransomware and how to protect yourself
Information about you, such as your purchase history or location, has value – just like money. Be thoughtful about who gets that information and how it’s collected through apps and websites