SecureIT

SecureIT provides training, information and online tutorials to help you protect your identity and devices. Ensure that your digital identity is properly safeguarded.

Tip of the Week:

Hackers Can Take Control of a Computer and Use It for Their Own Purposes. Keep Your Computer Secured and Learn to Recognize the Signs of Infection.

A virus or malicious program may not directly damage your computer but may instead turn it into a zombie. A zombie computer is a computer that a hacker can direct to complete certain tasks, such as attacking another target. Always keep your computer secured with antivirus protection to avoid this and complete a full system scan if you suspect your computer has been compromised. A compromised computer may begin running sluggishly, start crashing or begin performing tasks on its own such as sending out emails through your email account.


Phishing

Phishing scams appear to originate from a trusted source to trick a user into providing information. The attacker can then use this information to access your accounts, gather additional private information about you, and make purchases or apply for credit in your name.

More About Phishing

Identity Protection

Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else.

More about Identity Theft

Passwords

Your password protects you from unwanted access to your accounts. In combination with your userid, your password verifies who you are and also grants you access to protected resources.

More about Password Management