In a world where everyone has information that is important to protect, safeguarding that info has become a BIG business. The information security (infosec) field is incredibly important and in dire need of qualified professionals to join its ranks. Learn about five in-demand infosec jobs that may interest you.
Articles tagged with cyber security
Many Internet users get lulled into a false sense of security online. Don't make that mistake! We polled IT security experts to identify some tips and tricks to help you avoid online identity theft.
Maintaining your privacy doesn’t have to mean giving up the mobile devices that help you manage your daily life. You can keep yourself and your family protected from data thieves by avoiding some common mobile device security mistakes. Stay one step ahead of hackers with these security tips from technology experts.
Check out the latest video in our Tech Tutorial Series. In this video tutorial, we'll teach you how to identify and remove a computer virus.
Are you curious about cyber security and crimes? Do you want to learn more about how security breaches happen and how you can protect yourself? The Bloomington campus will be hosting an event focused on cybersecurity on Oct 30 from 5:30-7:30 p.m.
Cybersecurity blogs are a great source of information, education and conversation regarding the hot topics in the industry. We compiled a list of some of the best ones the Internet has to offer.
October is Cyber Security Awareness Month and what better way to celebrate than to evaluate your password habits? Our latest Tech Tutorial will walk you through some best practices to creating strong passwords.
In honor of Cyber Security Awareness Month, we put together a handy checklist to determine if your passwords are as secure as they should be. Use this tool to find out if you're at risk of being the target of a cyberattack.
Check out the latest episode of our Tech Tutorial Series. In this video tutorial, we'll walk you through the process of securing your router and wireless network. Following these steps will help you prevent your online activity from being used maliciously.
Check out the latest video in our Tech Tutorial Series. In this installment, we'll explain how to be a safe social media user. You'll learn handy tips and tricks for protecting your profiles.
Check out the latest video in our Tech Tutorial Series. In this video tutorial, we'll explain how to encrypt a hard drive. You'll be introduced to hard drive encryption technologies that you can use to secure your data.
Check out the first video in our Tech Tutorial Series. In this video tutorial, we'll show you some practical ways to help mitigate your risk of acquiring malware on your personal computer. Following these steps will help secure your sensitive data and keep your device running smoothly.