Quantcast
Channel: OIT Cybersecurity
Browsing latest articles
Browse All 10 View Live

Image may be NSFW.
Clik here to view.

Attackers Inside the Walls: Detecting Malicious Activity

Small and medium-sized businesses (SMBs) do not always have the budget for an advanced intrusion detection system (IDS) technology. Open-source software can fill this gap, but these free solutions may...

View Article


Image may be NSFW.
Clik here to view.

Social Media Safety

It has become near effortless to discover individuals or groups which one can connect with online that share a common characteristic. According to Merriam-Webster, a social network is defined as “a...

View Article


Image may be NSFW.
Clik here to view.

Avoid Being a Victim of Charity Fraud

Giving monetary donations to a cause you deem worthy is an admirable action. According to National Philanthropic Trust, Americans gave $427.71 billion in 2018 to charities. Fraudsters know holidays are...

View Article

Image may be NSFW.
Clik here to view.

Shopping Tips for the Holiday Season

It’s that time of year again, holiday shopping has begun! Everyone is looking for those unique gifts, new video games, trendy toys, and latest electronics. Whether it is a hard-to-find toy for kids or...

View Article

Image may be NSFW.
Clik here to view.

Tips to Secure New Devices and Your Home Internet for the New Year

The holiday season is upon us, which means shopping for the latest gadget is in full swing. With the massive number of discounts that are available this year, it makes sense for you to buy that latest...

View Article


Image may be NSFW.
Clik here to view.

Spotting Tax Scams to Avoid Being a Victim

Tax season is in full swing, which means criminals will go to great lengths to separate you from your money, your identity, or anything of value that is within their reach. They may offer seemingly...

View Article

Image may be NSFW.
Clik here to view.

Security Primer – Ryuk

Ryuk is one of the most prevalent ransomware variants in the state, local, tribal, and territorial (SLTT) government threat landscape, with infections doubling from the second to the third quarter in...

View Article

Image may be NSFW.
Clik here to view.

Intel Insights: How to Secure PowerShell

If PowerShell is not needed, prevent its execution on systems after performing appropriate testing to assess the impact to the environment. This may not always be possible since this is a legitimate...

View Article


Image may be NSFW.
Clik here to view.

Blockchain Technology: Local Government Applications and Challenges

This paper illustrates the benefits and challenges of blockchain technology by exploring case studies of its application and implementation in U.S. local governments as well as in other levels of...

View Article


Image may be NSFW.
Clik here to view.

Fake Online Coronavirus Map Installing Malware on Computers

Cyber criminals are taking advantage of the Coronavirus COVID-19 to steal personal data. A malicious website pretending to be the live map for Coronavirus Global Cases by Johns Hopkins University is...

View Article
Browsing latest articles
Browse All 10 View Live