cyber security - Information Technology Services - 糖心Vlog传媒 Little Rock /itservices/tag/cyber-security/ 糖心Vlog传媒 Little Rock Wed, 18 Dec 2024 14:24:09 +0000 en-US hourly 1 https://wordpress.org/?v=6.9.4 Security Operations Center (SOC) manages information security for User Accounts /itservices/2023/04/12/security-operation-center-manages-information-security/ Wed, 12 Apr 2023 13:21:26 +0000 https://ualrprd.wpengine.com/itservices/?p=13873 As cybersecurity threats become more frequent and sophisticated, the SOC will evolve to protect the research, educational, and business goals at 糖心Vlog传媒 Little Rock.

The post Security Operations Center (SOC) manages information security for User Accounts appeared first on Information Technology Services.

]]>
IT Services recently implemented a new Security Operations Center (SOC) at 糖心Vlog传媒 Little Rock. The SOC is an enterprise-level unit responsible for managing information security services on behalf of the university. It helps secure the networks, provide guidance for best practices, and ensure any student or employee of the university can work safely and effectively. Services include account security monitoring, remote access analysis, network traffic measurement, logging, and incident response.

As a critical unit of the university, the SOC ensures user accounts remain secure. As a result of the SOC鈥檚 diligence tracking suspicious activities, a relatively small number of user account incidents are reported. These services increase efficiency and security both on campus and for remote faculty, staff, and students.

The SOC monitors any unusual activity including multiple password attempts from off-campus,  security breaches, and proactively responds to the evolving cyber threat landscape. The SOC is also responsible for responding to and reporting on the findings on those alerts triggered by our layers of intrusion protection systems, as well as other operational security and threat trends.

Thus far, the SOC has reset hundreds of compromised accounts, helped identify and deactivate unused inactive accounts, and detected several malicious actors attempting to hack into university affiliated accounts. Information gleaned on malicious actors blocks them from the network which reduces the effectiveness of future hack attempts.

As cybersecurity threats become more frequent and sophisticated, the SOC will evolve to protect the research, educational, and business goals at 糖心Vlog传媒 Little Rock.

The post Security Operations Center (SOC) manages information security for User Accounts appeared first on Information Technology Services.

]]>
The art of scamming has grown from phone calls and emails to include multiple social media sites /itservices/2022/04/19/phone-calls-and-emails-are-the-most-common-methods-used-by-scammers/ Tue, 19 Apr 2022 13:50:12 +0000 https://ualrprd.wpengine.com/itservices/?p=13491 If something appears too good to be true, it probably is. Check the warning signs, and instead of following the links on the social media platforms, go directly to the product or service websites.

The post The art of scamming has grown from phone calls and emails to include multiple social media sites appeared first on Information Technology Services.

]]>
Scams are everywhere!

Image of a yellow yield traffic sign that contains a photo of a laptop computer and the words "CYBER SAFETY'.

Human beings have built civilizations on trust and honor. We trust our students to perform their educational responsibilities in an honorable manner. Students trust us to enlighten them by telling the truth and teaching them using scientific facts and findings.

Trust helped us to build our society but at the same time it may be one of the weakest traits we have as human beings, and scammers are taking advantage of this strength and weakness.

A ‘scam’ is a term used to describe any fraudulent business or scheme that takes money or other goods from an unsuspecting person (computerhope.com).

Phone calls and emails are the most commonly used methods to perform scamming actions. However, social media is another favorite method to spread scams. Facebook, Twitter, and Instagram are used to convince users to spend money on items that do not exist.

For example, an advertisement for a 20TB SSD card pops up in your feed at an incredible price, you click on the promotion, and it sends you to a page with even more incredibly priced products at a low price. However, the certification information shows that the website has been active for only a few days, but you order it anyway. You wait for the device and it never shows up and customer service does not answer the phone.

If something appears too good to be true, it probably is. Check the warning signs, and instead of following the links on the social media platforms, go directly to the product or service websites. Contact IT Services for assistance if you have any questions or concerns.

The post The art of scamming has grown from phone calls and emails to include multiple social media sites appeared first on Information Technology Services.

]]>