“In a statement, Zynga provided little detail on what data had been stolen but said that no financial information was compromised. The gaming giant says that it has taken steps to protect accounts, and that many users will be prompted by email notification to reset their passwords. You should change your password even if it’s not […]
Category Archives: Cybersecurity
Watch Out for This New Instagram Phishing Scam!
“This time, the crooks are tapping into a concern that many of us have – falling foul of copyright law. Lots of us innocently post and repost photos, GIFs, video clips and screenshots that we find amusing, informative, scary, and so forth… …but even if we’re only ever posting photos that we took ourselves, we […]
Cybersecurity Basics: Multi-factor Authentication Puts You In Control
Wouldn’t it be nice if your accounts could let you know when someone new is trying to get into them? Even better, wouldn’t it be terrific to make a stolen password useless? Rest easy, your account is safe! That’s essentially the control that multi-factor authentication (MFA) gives to you. And, it only takes about two […]
Cybersecurity Basics: A Hacker Is Demanding Bitcoins From You?!?
Have you received an email from a purported hacker who wants Bitcoins or some other form of cryptocurrency payment because they’ve somehow captured compromising information about you? Maybe they claim to have accessed your device’s camera or files and have your password as proof? Don’t panic. This is just an online scam commonly referred to […]
Cybersecurity Basics: Keeping Tabs on Mobile Devices
With an increasing amount of sensitive data being stored on personal devices, the value and mobility of smartphones, tablets, and laptops make them appealing and easy targets. These simple tips will help you be prepared in case your mobile device is stolen or misplaced. Encrypt sensitive information. Add a layer of protection to your files by […]
Cybersecurity Basics: Online Safety and Security
Shopping, surfing, banking, gaming, and connecting ‘smart’ appliances such as toasters and refrigerators are some of the many actions performed each minute in cyberspace. These common everyday activities carry the cyber threats of social engineering to gain unauthorized access to data, identity theft, bullying, location tracking, and phishing, to name just a few. How can […]
Cybersecurity Basics: Phishing and Email Scams
Starting this fall, email messages sent from outside our email system will be tagged with the following notice: CAUTION: This message originated from outside the Georgia Highlands College student email system. Exercise caution with links and do not open or preview unsolicited attachments. Never send your Social Security Number, driver’s license, federal ID, or bank […]