Page tree
Skip to end of metadata
Go to start of metadata


uwf logo

We use this space to provide a 'curated' set of IT security notices (those most likely to affect us in our type of business). If you have IT-security questions please send those on to the Help Desk and we will do our best to answer.

us-cert logo




us-cert homeland security logo

Tax Time Guide: Protect Personal, Financial, Tax Information and Computers

The Internal Revenue Service (IRS) has released tax-time advice intended to help the public protect their personal and financial data and computers. Recommendations include using strong passwords, backing up files, and using robust security software to help block malware and viruses.

Users and administrators are encouraged to review this week's IRS Tax-Time Guide and US-CERT Tip ST05-014, Real-World Warnings Keep You Safe Online, for additional information.


seal for computer crime investigative unit us army criminal investigation command

The FBI has provided 4 great brochures with tips for keeping safe while using Social Networking, please read on

ftc consumer info logo

The Federal Trade Commission (FTC) has released an alert on fraudulent mobile apps designed to exploit consumers. Some fake apps may steal personal information such as credit card numbers. By taking precautions, users can protect themselves and their private data.

US-CERT encourages users and administrators to refer to the FTC Scam Alert and background article on Understanding Mobile Apps.


When I rent a car, it’s fun to get all the bells and whistles – like navigation, hands-free calls and texts, streaming music and even web browsing. But did you know that cars with these features might keep your personal information, long after you’ve returned your rental car? Here are some things to keep in mind when renting a connected car.

https://www.consumer.ftc.gov/blog/what-your-phone-telling-your-rental-car

logo of Center for Internet Security

Traveling Securely

Summer is finally here and for many of us that means it’s time to get away! It’s not surprising that many cyber criminals target travelers. Luckily, with a little care it’s possible to protect yourself and avoid potential problems.



Good to know...

New Device for the Holidays? Check your CyberSecurity!
That new device you get or give during the holidays. Whether it's a smartphone, laptop, desktop, tablet, or another device, check out the below tips to help you protect your new technology and secure your personal data.

Wireless Keyboard eavesdropping
logo for Key Sniffer

As per the report from http://www.keysniffer.net wireless keyboard use could be easily picked up by malicious actors. IF you use one or use one in a conference room please check the list of affected devices found on this site.

For additional reading: http://www.zdnet.com/article/millions-of-wireless-keyboards-at-risk-of-spying-by-hackers-in-new-attack/

logo for US-CERT

Why does cybersecurity extend beyond computers?

Actually, the issue is not that cybersecurity extends beyond computers; it is that computers extend beyond traditional laptops and desktops. Many electronic devices are computers—from cell phones and tablets to video games and car navigation systems. While computers provide increased features and functionality, they also introduce new risks. Attackers may be able to take advantage of these technological advancements to target devices previously considered "safe." (keep reading this tip)

Cyber Security resources (UWF Libraries)