Search2 Results

Security best practices and the campus Minimum Information Security Controls Standard require using supported software to ensure timely security updates. Unsupported software must be upgraded or removed, and it's essential to monitor your applications' and operating system's "end of life" status to plan for necessary upgrades.
In your personal life, there are four key actions that you can take to reduce the risk of falling victim to a cyber scam. This article covers those four points.