Take 5 minutes to secure your account and ensure your privacy with Google.

Google has a set of online tools available for quickly checking and modifying your account settings.

Start by going to myaccount.google.com where you can manage “Sign-in & security”, “Personal info & privacy” and ‘Account Preferences”. Towards the bottom of the page, you can “Get Started” with a  “Security Checkup” which will walk you through setting recovery options, checking connected devices and account permissions. The “Privacy Checkup” tool will show you what you have shared using your Google+ profile and the types of information collected to personalize your Google experience. Settings include allowing people to search for your name, number and other information, photo settings including geographic locations and managing web & app activity.

Be sure to take some time to review what Google collects and what you want made available for people to see. You might be surprised what you find as your existing settings!

Proofpoint Secure Email

secure_emailBy leveraging the Proofpoint appliances we have today, which are responsible for scanning messages for spam and viruses, we are able to provide UMass Lowell users with the ability to send encrypted email whenever necessary.  Proofpoint works seamlessly with our existing email Exchange servers as it encrypts email leaving the University’s private networks and heads out onto the Internet. Continue reading

Making “Digital Spring Cleaning” an Annual Ritual

Last week, the National Cyber Security Alliance (NCSA) and Better Business Bureau (BBB) announced that they are encouraging consumers to put cybersecurity top of mind by urging them to make digital devices an additional target of their spring cleaning activities. Let’s encourage students, faculty, staff, family, and friends to make a thorough “digital spring cleaning” an annual ritual. Internet users can get a fresh start with their online life by keeping all machines clean, purging their online files, enhancing security features and ensuring that their online reputation shines.

Continue reading

The anatomy of a cyber attack

Click here to watch a video which outlines how a cyber attack occurs.  Although this story is fictitious, the methods are real and commonly used by cyber attackers.

As always, please don’t hesitate to contact the IT Service Desk at 978 934 4357 should you have security related questions or concerns.