What is identity theft?
How identity thieves get your personal information?
Phishing e-mails are becoming more sophisticated and can be tricky to spot. Being able to recognize phishing e-mails can help prevent you from becoming a victim.
All of us are concerned about personal and financial information, and while TRU employs good security and technological safeguards, your help is needed to protect confidential information. Following these 10 steps is a simple and effective way to reduce the risk of theft or misuse of yours and others personal and financial information.
Clicking a link or document in a malicious email can significantly affect TRU, beyond the risk it poses to the confidentiality of personal information.
Annual security and privacy awareness training is mandatory and must be completed by all new employees within the first month of employment.
Need desktop encryption, anti-virus, link scanner, spyware, password management, or firewall tools? Choose one or more of the items listed inside.
Digital signature tools utilizes either web based or software installed on your computer to enable you to sign a document electronically.
Starting June 5th, 2023, IT Services will be fully implementing Microsoft 365 Spam Protection. For most people the biggest change you see is spam email will now be redirected to your Junk Email folder in Outlook. As it learns your email patterns we recommend you check your Junk Email folder occasionally to make sure it has not caught something you know is legitimate.
Pass phrases are easier to remember, easier to type, and more secure!
Pharming, pronounced farming, is a means of directing you to a fraudulent web site without your knowledge. The primary objective is to convince you to enter confidential data.
Phishing is a common online scam designed to trick you into disclosing your personal or financial information for the purpose of financial fraud or identity theft.
A fake or "spoofed" website can look just like a company's real site. Look for these signs to spot a fake site.
If you forget your password, some systems allow you to use shared secrets to gain access and reset your password.
With the increasing use of mobile devices comes accompanying risks to data stored on the devices. Following are a number of best practices to help users secure their smart phones.
DUO 2FA 2 Furious (DUO YubiKeys)