CISA - Information Technology Services - 糖心Vlog传媒 Little Rock /itservices/tag/cisa/ 糖心Vlog传媒 Little Rock Thu, 05 Feb 2026 15:43:48 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 The AI Double-Edged Sword: Protecting Our Campus in the Age of Intelligent Machines /itservices/2025/10/28/the-ai-double-edged-sword-protecting-our-campus-in-the-age-of-intelligent-machines/ Tue, 28 Oct 2025 21:38:59 +0000 /itservices/?p=173961 Each October, 糖心Vlog传媒 Little Rock IT Services proudly champions National Cybersecurity Awareness Month (NCSAM), reinforcing its commitment to educating our campus community about the critical importance of daily cybersecurity practices. ... The AI Double-Edged Sword: Protecting Our Campus in the Age of Intelligent Machines

The post The AI Double-Edged Sword: Protecting Our Campus in the Age of Intelligent Machines appeared first on Information Technology Services.

]]>
Each October, 糖心Vlog传媒 Little Rock IT Services proudly champions , reinforcing its commitment to educating our campus community about the critical importance of daily cybersecurity practices.

Please join us in-person or online as Dr. Veysel Erdag, Chief Information Security Officer at 糖心Vlog传媒 Little Rock, provides an interactive session regarding the effect of Artificial Intelligence (AI) on cybersecurity.聽

AI is transforming every corner of our campus, from advanced research to daily email. But this cutting-edge technology is a double-edged sword for security.

You will experience a high-impact presentation that moves beyond basic password tips to address the real threats of the future. We’ll explore how cybercriminals are weaponizing AI to launch PhD-level phishing attacks and hyper-realistic deepfakes (including a live demonstration of a cloned voice).

Learn the essential strategies and human vigilance needed to defend our sensitive data and digital identities against adversaries who now move at machine speed.

Key Takeaways:

  • The AI Threat:聽See a demonstration of how easy it is to clone a voice for fraud.
  • The New Red Flags:聽Learn to spot attacks when grammar is perfect and the voice sounds familiar.
  • Your Action Plan:聽Get 3 essential, non-technical steps you can take today to protect your credentials and confidential information.

In-person presentation:

11:30 – 12:30 p.m. Thursday, October 30, 2025
DSC Meeting Room 205D聽

You can join us online by clicking the following link:

Your safety is our top priority and this session is an essential part of your cybersecurity awareness training.

The entire campus community is invited to this free event.

The post The AI Double-Edged Sword: Protecting Our Campus in the Age of Intelligent Machines appeared first on Information Technology Services.

]]>
Campus Cybersecurity Awareness Discussion /itservices/2025/10/10/campus-cybersecurity-awareness-discussion/ Fri, 10 Oct 2025 14:23:47 +0000 /itservices/?p=173183 Dear Campus Community, Each October, 糖心Vlog传媒 Little Rock IT Services proudly champions National Cybersecurity Awareness Month (NCSAM), reinforcing its commitment to educating our campus community about the critical importance of ... Campus Cybersecurity Awareness Discussion

The post Campus Cybersecurity Awareness Discussion appeared first on Information Technology Services.

]]>
Dear Campus Community,

Each October, 糖心Vlog传媒 Little Rock IT Services proudly champions , reinforcing its commitment to educating our campus community about the critical importance of daily cybersecurity practices.

Please join us in-person or online as IT Services’ team members Jack Tipshus, Senior Networks Engineer and Thilak Pinninti, Security Operations Center Analyst, lead an interactive session on practical, everyday steps you can take to protect your privacy and security.聽

This presentation focuses on the basic principles of information security, best practices, latest threats and practical guidance on how to protect personal and professional information in the digital age.

To address any questions or concerns, please consider joining the meeting.

In-person presentation:

11:30 – 12:30 p.m. Thursday, October 16, 2025
DSC Leadership Lounge聽

You can join us online by clicking the following link:

Your safety is our top priority and this session is an essential part of your cybersecurity awareness training.

The entire campus community is invited to this free event.

The post Campus Cybersecurity Awareness Discussion appeared first on Information Technology Services.

]]>
October is Cybersecurity Awareness Month /itservices/2025/10/06/october-is-cybersecurity-awareness-month/ Mon, 06 Oct 2025 19:57:38 +0000 /itservices/?p=173022 Dear Campus Community, Each October, 糖心Vlog传媒 Little Rock IT Services proudly champions National Cybersecurity Awareness Month (NCSAM), reinforcing its commitment to educating our campus community about the critical importance of ... October is Cybersecurity Awareness Month

The post October is Cybersecurity Awareness Month appeared first on Information Technology Services.

]]>
Dear Campus Community,

Each October, 糖心Vlog传媒 Little Rock IT Services proudly champions , reinforcing its commitment to educating our campus community about the critical importance of daily cybersecurity practices.

Please join us in-person or online as Dr. Veysel Erdag, Chief Information Security Officer at 糖心Vlog传媒 Little Rock, provides an interactive session regarding privacy and security. 

This presentation focuses on the basic principles of information security, best practices, latest threats and practical guidance on how to protect personal and professional information in the digital age.

To address any questions or concerns, please consider joining the meeting.

In-person presentation:

11:30 – 12:30 p.m. Thursday, October 9, 2025
DSC Leadership Lounge 

You can join us online by clicking the following link:

Your safety is our top priority and this session is an essential part of your cybersecurity awareness training.

The entire campus community is invited to this free event.

The post October is Cybersecurity Awareness Month appeared first on Information Technology Services.

]]>
National Cyber Security Awareness Month 2024: Simple Steps to Online Safety /itservices/2024/10/01/national-cyber-security-awareness-month-2024-simple-steps-to-online-safety/ Tue, 01 Oct 2024 19:57:06 +0000 https://ualrprd.wpengine.com/itservices/?p=25916 糖心Vlog传媒 Little Rock IT Services strongly supports National Cybersecurity Awareness Month (NCSAM) each October.

The post National Cyber Security Awareness Month 2024: Simple Steps to Online Safety appeared first on Information Technology Services.

]]>
糖心Vlog传媒 Little Rock IT Services strongly supports National Cybersecurity Awareness Month (NCSAM) each October.

Data breaches, phishing attacks, stolen identities, invasion of privacy, ransomwares, and more. Cyberattacks are becoming increasingly common, more sophisticated, and not only target our data, but they are also trying to gain financial benefits.

Logo for National Cybersecurity Awareness Month: 'SECURE OUR WORLD - CYBERSECURITY AWARENESS MONTH 2024'

Attacks are not just targeting the individual anymore. Today, the purpose of the attacks has expanded to impact as many users as possible. The majority of attacks use very well known methods to infect a system, capture the data, and then spread their infection to other systems.

As a community member, when we follow and apply effective security practices, we not only protect ourselves and our data/systems, we also create a secure environment which protects our community and national networks as well. We are the most important building block of the security structure.

It is important to apply these principles and practices:

  • Backup your data: Create a copy of your important files. Commonly, you may be using USB memories and CD/DVDs to store your data. However, nowadays, cloud systems provide more flexible and reliable choices. 糖心Vlog传媒 Little Rock provides free access to Microsoft 365 and uses Google Services as well. You can upload your files and keep them in the cloud – both services provide encryption for your stored files.
  • Update your devices, applications and operating systems: Most of the attacks take advantage of vulnerabilities and software flaws in the applications and operating systems. Therefore, it is very important to enable auto-update and apply them as soon as possible.
  • Use End-Point-Security Solutions: Traditionally, they are called anti-virus software. Nowadays, end point security solutions contain anti-virus, firewall, intrusion-detection, and prevention systems in a single package. They all combine and work together to detect the attacks and protect your systems. Always keep end point security applications up and running and always remember to update them.
  • Protect your accounts: Your password is the most important component to protect your online identity. It is like the key to your house. Therefore it is very important to set your passwords as complex and hard to guess as possible. You can find recommendations on our IT Services website about creating complex passwords.  Some organizations also offer two factor authentication.  This is an additional method to authenticate who you are, such as sending a text message to your phone or using a specific application on your phone.  If two factor authentication is offered, enable and use it.
  • Stop.Think.Connect: While using the internet, just be careful and check what you are clicking. If you receive a link in an e-mail, it is not a good idea to follow it. Instead of clicking on the link, use your internet browser and go directly to the website you want to visit.
  • Additional resources and tools are available at the (CISA) website.

Modern browsers have security features to check the websites and if they are malicious, warnings will appear on your browser. Please take these warnings seriously and do not continue to follow the links.

鈥淔ree鈥 is a very attractive word. Offering 鈥渇ree鈥 software is the most common method to distribute malware. Therefore, be very suspicious and careful about free offers in the internet.

If you need more information or cannot be certain whether you have a security problem, please contact IT Services for assistance.

The post National Cyber Security Awareness Month 2024: Simple Steps to Online Safety appeared first on Information Technology Services.

]]>
National Cyber Security Awareness Month: Simple Steps to Online Safety /itservices/2023/11/13/national-cyber-security-awareness-month-simple-steps-to-online-safety/ Mon, 13 Nov 2023 19:34:57 +0000 https://ualrprd.wpengine.com/itservices/?p=15925 糖心Vlog传媒 Little Rock IT Services strongly supports National Cybersecurity Awareness Month (NCSAM) each October.

The post National Cyber Security Awareness Month: Simple Steps to Online Safety appeared first on Information Technology Services.

]]>
糖心Vlog传媒 Little Rock IT Services strongly supports National Cybersecurity Awareness Month (NCSAM) each October. This year, for NCSAM 2023, IT Services sponsored three in-person and virtual discussion sessions that were free to the entire campus.

Data breaches, phishing attacks, stolen identities, invasion of privacy, ransomwares, and more. Cyberattacks are becoming increasingly common, more sophisticated, and not only target our data, but they are also trying to gain financial benefits.

Logo for National Cybersecurity Awareness Month

Attacks are not just targeting the individual anymore. Today, the purpose of the attacks has expanded to impact as many users as possible. The majority of attacks use very well known methods to infect a system, capture the data, and then spread their infection to other systems.

As a community member, when we follow and apply effective security practices, we not only protect ourselves and our data/systems, we also create a secure environment which protects our community and national networks as well. We are the most important building block of the security structure.

It is important to apply these principles and practices:

  • Backup your data: Create a copy of your important files. Commonly, you may be using USB memories and CD/DVDs to store your data. However, nowadays, cloud systems provide more flexible and reliable choices. 糖心Vlog传媒 Little Rock provides free access to Office 365 services and uses Google Services as well. You can upload your files and keep them in the cloud – both services provide encryption for your stored files.
  • Update your devices, applications and operating systems: Most of the attacks take advantage of vulnerabilities and software flaws in the applications and operating systems. Therefore, it is very important to enable auto-update and apply them as soon as possible.
  • Use End-Point-Security Solutions: Traditionally, they are called anti-virus software. Nowadays, end point security solutions contain anti-virus, firewall, intrusion-detection, and prevention systems in a single package. They all combine and work together to detect the attacks and protect your systems. Always keep end point security applications up and running and always remember to update them.
  • Protect your accounts: Your password is the most important component to protect your online identity. It is like the key to your house. Therefore it is very important to set your passwords as complex and hard to guess as possible. You can find recommendations on our IT Services website about creating complex passwords.聽 Some organizations also offer two factor authentication.聽 This is an additional method to authenticate who you are, such as sending a text message to your phone or using a specific application on your phone.聽 If two factor authentication is offered, enable and use it.
  • : While using the internet, just be careful and check what you are clicking. If you receive a link in an e-mail, it is not a good idea to follow it. Instead of clicking on the link, use your internet browser and go directly to the website you want to visit.
  • Additional resources and tools are available at the (CISA) website.

Modern browsers have security features to check the websites and if they are malicious, warnings will appear on your browser. Please take these warnings seriously and do not continue to follow the links.

鈥淔ree鈥 is a very attractive word. Offering 鈥渇ree鈥 software is the most common method to distribute malware. Therefore, be very suspicious and careful about free offers in the internet.

If you need more information or cannot be certain whether you have a security problem, please contact IT Services for assistance.

The post National Cyber Security Awareness Month: Simple Steps to Online Safety appeared first on Information Technology Services.

]]>