QR codes are convenient but can also be exploited by scammers to steal your personal information or install malicious software. Here’s how to protect yourself: Be Cautious with Unknown Sources: Only scan QR codes from trusted and verified sources. Avoid scanning codes found in unsolicited emails, random flyers, or suspicious websites. Check the URL: After… Read More
You might think you’re safe behind your home Wi-Fi, but the truth is, no one is completely immune to online threats. Even with the strongest security measures, there’s always a risk of someone eavesdropping on your internet traffic. Here are some tips to help you stay protected: Beware of Phishing: Be cautious of emails, texts, or… Read More
Last week’s tip was why and when you should freeze your credit. This week’s tip is how to do so. Gather all your necessary information, then contact the three credit bureaus. Read more for detailed instructions.
Freezing your credit is a prudent step in several situations to safeguard against identity theft and unauthorized access. This week’s tip is the why, and when, you should freeze your credit. Next week’s tip will be how to do it. Read more for the times you should freeze your credit.
Getting a new phone is exciting. Transferring pictures, data, and apps can be time-consuming and a little frustrating. However, don’t spend all your time on the new device. Your old one needs some attention too. You need to remove all of that personal information from that device before you get rid of it. Read more for tips.
What we’ve seen in campus emails are “urgent” scams telling you that you have 24 hours to change your password or be locked out of an account, gift card scams pretending to be from college deans or department heads, and too-good-to-be-true part-time job opportunities. Read more for resources on how to spot these scams, and what has been reported as large-scale phishing attempts outside of our UTHSC environment.
Amazon Prime Day is this week, and there are plenty of deals for you to take advantage of. However, cybercriminals are also looking to turn these deals to their advantage. In this particular scam, cybercriminals have created fake websites that look very similar to the real Amazon website. Then, they send you phishing emails and text messages that contain links to the fake websites they created.
We talk about passwords a lot. Create strong passwords. Use upper- and lower-case letters, numbers, and symbols. Use a password manager. But the easiest way to unsecure your password is to share it. Realize that if you share your password with someone else (family member, coworker, etc.) they have access to EVERYTHING in that account. If a department needs shared information, create a SharePoint site. Use Google Drive or another similar sharing app if your family needs shared information. There are many ways to share information that is much more secure than password-sharing.