Centura College

Connecting Communities & Careers

Information Technology: Keeping Your Information Safe

Posted by on Aug 2, 2017 in Bachelor Degree Completion Program, Centura College

By Robb Rajnys and Jul DeGeus

With great technological advances, comes great technological responsibilities; like protecting your personal information.

Thanks to the progress of technology, we are living in an age where you can accomplish almost anything with a swipe of a finger. Track your fitness, manage your bank account or even supervise your lights and lock systems at your home remotely; that is, as long as you have a Wi-Fi connection and a charged smart phone. But like all great things, technology comes with a downfall: cyberattacks.

Understanding Cyberattacks

There severity of a cyberattack is only limited to the imagination of the person who creates the virus. Familiarize yourself with common terms and proactive prevention to ensure the safety of your personal information:

Malware: In Latin, “mal” means “bad,” it’s no surprise that malware is the general term for malicious threats, like Trojans or worms, that try to steal and destroy data.

Malvertising: Keeping in mind that the Latin root of “malware”, malvertising is an ad that has been infected with malware. When you click on the ad, whatever was effect the cyberattacker loaded in the coding of the ad is downloaded on your computer.

Password Attacks: Probably the most obviously attack term, password attacks occur when a hacker tries to steal your password for information. Cyber thieves can use a program to access your passwords, or even resort to old fashioned ways: peering over your shoulder to see your smart phone screen as you type in the pin to your debit card.

Phishing: Another term many people are familiar with is “phishing.” This attack targets your email accounts. The attacker sets up a company and requests personal information or provides a link to click on. The website’s information you’re directed to aligns with the information you received in the email, sometimes creating a false sense of security and legitimacy. As soon as you input your information, the hackers can use it as they see fit.

Ransomware: In a nut shell, Ransomware is a virus that will lock you out of all your data- documents, photos, contacts, etc. – until you pay a fee. If you chose not to pay the fee, you’ll have to wipe your whole computer in order to use it, losing all of your data anyway.

Thwarting the Attacks

Never fear, prevention is out there! To counter the above hazards, ensure you install and adhere to the following:

Firewalls: This is a virtual gate, if you will, that can prevent or allow certain traffic from leaving or gaining access to your PC. To increase effectiveness, the firewall should stay turned on, especially if you are connected to the internet.

Antivirus Software with Ransomware Protection: Invest in a good antivirus software that includes a ransomware protection plan; good meaning that you should pay for it. Most free antivirus protection software only monitors issues and then alert you, not take care of the problem. Purchasing antivirus software provides monitoring and proactive protection.

Keep Your PC Up to Date: Most users do not maintain their updates. Updates are important because they’re purpose is to help keep your computer safe.  Every time a new malware is developed or and old one is updated, programmers hastily work to develop and push out an update to their consumers to counteract its effects, keeping your information all the more protected.

Email: Everyone on the planet has an email now a days. 91% of cyberattacks stem from email. Be wary of emails you receive that:

  • Request passwords
  • Request your Social Security Number
  • Offer anything “free”
  • Alert you with an “urgent” warning or threat of an expiration of an account
  • Request credit card information

Everywhere you go on the internet leaves “footprints;” where you shop, where you bank, what you may want to buy, etc. Malware picks up on your “footprints” and tries to trick you by creating emails and pop-up advertisements that are catered to your internet browsing, searching and buying habits. If something look suspect, treat it as such. However, if you land on a website you’re not so sure about or regret downloading a file, there are handy websites to scan files or sites in question.

File Storage: Backup your computer and all data regularly to ensure its safety. Use a secure file housing website, software, or simply copy important folders and files to a USB disk regularly. This minimizes the impact, headaches and helps to avoid having pay a ransomware to get your vital documents.

How to Earn a Bachelor of Science Degree in Business in 15 months

Posted by on Apr 22, 2014 in Bachelor Degree Completion Program

Earn a Bachelor of Science Degree in Business in 15 months

Earn a Bachelor of Science Degree in Business

Earn your Bachelor’s Degree in as little as 15 months!

It hardly seems fair sometimes, but it is certainly true now more than ever.  Today’s competitive workforce often means that those with the right level of education and experience receive preference over those with limited college and/or related work experience.  This also means that those who do not have the right education and experience often get left behind or passed over for certain career opportunities, promotions and even raises.

So the question then becomes; “How do I get the education and training I need to accelerate my career and earnings potential and further, how do I get it FAST?”

…Read More Here

<