M-F 8:30 a.m. - 5 p.m.
Information Technology Security
Threats on the Net (Viruses, Hoaxes, Scams, etc)
Cybersecurity Awareness Videos
As part of the national effort to raise awareness about these issues, University Technology Services has created several short videos that include information about staying safe online and keeping your computer more secure.
Videos pertaining specifically to email security
The Dark Side of Email: How Email Works (2:31): Information contained in this video is applicable to both Windows and Mac users. In its most commonly used form, email should be treated as an insecure communications medium. To better understand the risks inherent with email use, a basic understanding of how email typically works is necessary.
The Dark Side of Email: Phishing (5:00): Information contained in this video is applicable to both Windows and Mac users. Have you ever received an email message asking you to update your username and password that looks legitimate but somehow feels like a scam? This video will clearly demonstrate how to spot a particular type of scam email, known as phishing, so you will not be a victim.
Videos pertaining to general security improvements that will better protect your Internet
File Hippo (2:05): Information contained in this video is intended for Windows users. This video will discuss a free tool named FileHippo Update Checker which can be used to help you keep the dozens of non-Microsoft programs installed on your computer in a more current state. This is important because as Microsoft has gradually improved the security of the Windows operating system, attackers and computer criminals have shifted an increasing amount of attention to these generally less secure programs, such as Adobe Reader, Adobe Flash and Oracle Java – none of which Microsoft is directly responsible for updating.
Open DNS (4:01): Information contained in this video is applicable to both Windows and Mac users. While this information is intended to help viewers protect Internet connected devices on their home networks, the provided tips and suggestions can be broadly applied to other networks as well.
A video pertaining specifically to wireless network security in home environments
Basic Wi-Fi (2:15): Information contained in this video is applicable to both Windows and Mac users. While this information is intended to help viewers protect their home wireless networks, the provided tips and suggestions can be broadly applied to other wireless networks as well.
The 2009 Identity Fraud Survey Report, released by Javelin Strategy & Research on Feb 9th, 2010, confirms that the number of identity fraud victims has increased 22 percent over the previous year to 9.9 million adults in the United States. A large portion of these victims lost their identities because institutions and agencies similar to our own University of South Carolina mishandled the victim's personal data. To help mitigate this threat, while protecting ourselves, faculty, staff and students, we can educate all parties involved on how to securely remove sensitive data from our personal computers. These instructional videos aim to inform us on the topic of securely deleting sensitive data with freely available tools.
Locating Sensitive Data (3:05): Information contained in this video, while specifically intended for Windows users, is also generally applicable to Mac users.
Locating Credit Card Data (3:00): Information in this video is intended for Windows, Mac, and Linux users.
Secure Deletion of Files: Mac (1:39): Information contained in this video is intended for Mac users.
Secure Deletion of Files: Windows (2:26): Information contained in this video is intended for Windows users.
Lunch and Learn Training Videos
Open Source Intrusion Detection - March 14
Security for Developers
Information Security Industry Published Standards