Search Information Security site

 

Main menu

Past News Articles

September 30, 2020

Do your part to cybersecure the Internet of Things.

Image of a connected city skyline with the caption "Internet of things connects everything. Protect your connections from cyber threats."

Image of a connected city skyline with the caption "Internet of things connects everything. Protect your connections from cyber threats."

In the final week of Cybersecurity Awareness Month, learn how to secure Internet of Things devices. 

Read More...




September 30, 2020

Cybersecure your healthcare.

Image of health instruments and a computer with the caption "Protect your health and your data."

Image of health instruments and a computer with the caption "Protect your health and your data."

In Week 3 of National Cybersecurity Awareness Month, learn how you can protect your health data as healthcare goes online. 

Read More...




September 30, 2020

Cybersecure your smart business.

Image of a city skyline with the caption, "Do Secure Business. Protect connected devices from cyber-attacks."

Image of a city skyline with the caption, "Do Secure Business. Protect connected devices from cyber-attacks."

In Week 2 of Cybersecurity Awareness Month, learn how to cybersecure interconnected devices at your business. 

Read More...




September 30, 2020

Cybersecure your smart home.

Image of a smart home with the caption "Get smart. Secure your connected home against a cyber break in."

Image of a smart home with the caption "Get smart. Secure your connected home against a cyber break in."

Cybersecurity awareness month is here. In Week 1, learn how to secure your smart home. 

Read More...




August 31, 2020

You can trust this QR code, but that's not always the case.

A QR code linking to the QR-Hack page on the UVA Security website, with a caption: "Get a scan on what could be hiding behind a QR code."

A QR code linking to the QR-Hack page on the UVA Security website, with a caption: "Get a scan on what could be hiding behind a QR code."

Learn more about QR hacking and how to prevent it. 

Read More...




July 01, 2020

Cognitive dissonance is the culprit.

An image of data and a head with neurons inside that reads "Everyone knows they have weak passwords. So why aren't they changing them?"

An image of data and a head with neurons inside that reads "Everyone knows they have weak passwords. So why aren't they changing them?"

Read more to explore the phenomenon of cybersecurity cognitive dissonance, and how to overcome it. 

Read More...




Pages

Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security office will evaluate the report and provide a full investigation if appropriate.

Complete Report Form