OUCH! Security Awareness Newsletter
Security Menu
- Home
- Take Action
- Education & Guides
- Password Management
- Physical Security
- Theft of Computer Equipment
-
Policies & Procedures
- Account Access and Recovery
- Alabama Breach Notification Act of 2018
- Admin Systems Security Access Authorization Process
- Copyright Information
- E-mail Policy
- Information Technology Usage Policy
- International Travel Requirements
- World Wide Web Policy
- Technology Policies
- Technology Standardization Guidelines
- Additional Resources
- Quarterly IT Security Award
OUCH! Security Awareness Newsletter
- Don’t Let Cybercriminals Swipe Your Savings: Lock Down Your Financial Accounts! (November 2024)
- Download Danger: How to Outwit Malicious Mobile Apps (October 2024)
- Phantom Voices: Defend Against Voice Cloning Attacks (September 2024)
- Guard Your Heart (and Wallet) Against Romance Scams (August 2024)
- Text Messaging Attacks: A Smishing Saga (July 2024)
- Going on Vacation? Simple Steps to Make it Cybersecure (June 2024)
- Top Three Ways Cyber Attackers Target You (May 2024)
- Start A Career in Cybersecurity (April 2024)
- Messaging Do’s and Don’ts (March 2024)
- Identity Theft: Preventing, Detecting, and Responding (February 2024)
- QR Codes (January 2024)
- The Power of the Passphrase (December 2023)
- The Power of Updating (October 2023)
- Online Security for Kids (September 2023)
- Stop Those Phone Call Scams (July 2023)
- Securing Your Financial Accounts (June 2023)
- Artificial Intelligence: What to Know (May 2023)
- Scareware: A Story (April 2023)
- Digital Spring Cleaning in 7 Simple Steps (March 2023)
- Do I Need Security Software? (February 2023)
- Biometrics – Making Security Simple (January 2023)
- Disposing of Your Mobile Device (December 2022)
- Browsers (November 2022)
- Got Backups? (September 2022)
- Charity & Disaster Scams (August 2022)
- Phishing Attacks Are Getting Trickier (July 2022)
- Securely Gaming Online (June 2022)
- Top Three Social Media Scams (April 2022)
- Learn a New Survival Skill: Spotting Deepfakes (March 2022)
- Anyone Can Start a Career in Cybersecurity (February 2022)
- Spot and Stop Messaging Attacks (January 2022)
- Top Cybersecurity Tips for Vacations (December 2021)
- Shopping Online Securely (November 2021)
- Avoid The Most Common Email Mistakes (October 2021)
- One Simple Step to Securing Your Accounts (September 2021)
- Securely Using the Cloud (August 2021)
- Securing Your Mobile Devices (July 2021)
- Securely Using Mobile Apps (June 2021)
- Vishing - Phone Call Attacks and Scams (May 2021)
- Privacy - Protecting Your Digital Footprint (April 2021)
- Identity Theft - Protecting Yourself (March 2021)
- I'm Hacked. Now What? (February 2021)
- Securing Wi-Fi at Home (January 2021)
- Securing the Generation Gap (December 2020)
- Social Engineering Attacks (November 2020)
- Fake News (October 2020)
- Online Security for Kids (September 2020)
- Virtual Conferencing Safely and Securely (August 2020)
- Ransomware (July 2020)
- Creating a Cyber Secure Home (June 2020)
- The Power of Updating (May 2020)
- Password Managers (April 2020)
- Digital Spring Cleaning (March 2020)
- Social Media Privacy (February 2020)
- Digital Inheritance ( January 2020)
- Messaging/Smishing Attacks (December 2019)
- Shopping Online Securely (November 2019)
- Four Simple Steps to Staying Secure (October 2019)
- Scamming You Though Social Media (September 2019)
- Got Backups? (August 2019)
- Virtual Private Networks (July 2019)
- Dark Web (June 2019)
- A Career in Cybersecurity (May 2019)
- Making Passwords Simple (April 2019)
- Disposing of Your Mobile Device (March 2019)
- Personalized Scams (February 2019)
- Search Yourself Online (January 2019)