As part of NYU’s commitment to help protect the University’s networks and data, NYU IT launched a new email security feature on September 28. In compliance with NYU IT’s security policies, email protection is a priority. The University’s existing email security tool prevents external email with known malicious URLs from reaching your inbox. This new […]
NYU IT announces the availability of a new service: Electronic Signature (DocuSign), an electronic and digital signature application with several workflow capabilities. Send: Easily upload and send documents for electronic signature to people inside or outside of NYU. Receive: Signers receive and sign documents quickly, securely, and via phone, tablet, or computer. Manage: Check documents’ […]
Please join Torch Tech and Women in Technology (WIT) on Tuesday, October 16, at the Kimmel Student Center, Room 406, from 12:30pm to 2pm for a lunch and a conversation with Tony Cetera, NYU IT’s Chief Information Security Officer. October is Cybersecurity Awareness Month, and Tony’s talk coincides with one of the month’s themes, “IT […]
October is National Cybersecurity Awareness Month. To celebrate, NYU IT is posting videos and quizzes, as well as providing links to resources and tips to help you stay secure and protect yourself from cyber threats.
Privacy and security are synergistic, so paying attention to browser privacy settings and features is critical for your online security. In this article are some of the steps you can take and features you can take advantage of to help protect your privacy and security while browsing the web.
Being a victim of identity theft can cause anxiety and frustration, but there are corrective and preventive steps you can take. Below are some precautions that can lessen your likelihood of becoming a victim of identity theft, as well as some steps you can take if you are the victim of identity theft.
Recently, there have been several striking security breaches in the news. The hack of the Democratic National Committee and the Equifax breach were the most high-profile, but there were other breaches that exposed the personal information of millions.
Link shortening services can reduce URLs to 10-30 characters. Be mindful of the fact that the link shortening process masks the true destination URL and shortened URLs are often used by scammers to trick users into clicking malicious links. Stay safe by verifying the destination of shortened URLs.
Email has become the most common avenue for phishing scams, which use social engineering to take advantage of users. Variations of phishing, each with different characteristics, include spear phishing and whaling. Learn how to spot these emails and how you can avoid enabling them to steal your data.
Ransomware tricks users into installing itself on their devices. Ransomware scams most commonly occur via email social engineering scams, a/k/a phishing scams. In ransomware attacks, malware encrypts a user’s files and requests ransom payment to unlock the files and restore encrypted content.