Go to USC home page USC Logo University Technology Services
RSS Feed Twitter Facebook
1244 Blossom St.
Office Hours:
M-F 8:30 a.m. - 5 p.m.

Service Desk Hours:
M-F 8 a.m. - 6 p.m.

iCARE Center Hours:
M-F 8:30 a.m. - 5 p.m.

GET HELP!






Information Technology Security

Resources

Safe Computing

Threats on the Net (Viruses, Hoaxes, Scams, etc)

Useful Downloads

Vulnerability Databases

Training Resources

Security Videosnew

Cybersecurity Awareness Videos

As part of the national effort to raise awareness about these issues, University Technology Services has created several short videos that include information about staying safe online and keeping your computer more secure.


Videos pertaining specifically to email security

The Dark Side of Email: How Email Works (2:31): Information contained in this video is applicable to both Windows and Mac users.  In its most commonly used form, email should be treated as an insecure communications medium.  To better understand the risks inherent with email use, a basic understanding of how email typically works is necessary.   

The Dark Side of Email: Phishing (5:00): Information contained in this video is applicable to both Windows and Mac users.  Have you ever received an email message asking you to update your username and password that looks legitimate but somehow feels like a scam?  This video will clearly demonstrate how to spot a particular type of scam email, known as phishing, so you will not be a victim.  


Videos pertaining to general security improvements that will better protect your Internet
connected devices and Windows computers

File Hippo (2:05): Information contained in this video is intended for Windows users.  This video will discuss a free tool named FileHippo Update Checker which can be used to help you keep the dozens of non-Microsoft programs installed on your computer in a more current state.  This is important because as Microsoft has gradually improved the security of the Windows operating system, attackers and computer criminals have shifted an increasing amount of attention to these generally less secure programs, such as Adobe Reader, Adobe Flash and Oracle Java – none of which Microsoft is directly responsible for updating. 

Open DNS (4:01): Information contained in this video is applicable to both Windows and Mac users.  While this information is intended to help viewers protect Internet connected devices on their home networks, the provided tips and suggestions can be broadly applied to other networks as well. 


A video pertaining specifically to wireless network security in home environments

Basic Wi-Fi (2:15): Information contained in this video is applicable to both Windows and Mac users.  While this information is intended to help viewers protect their home wireless networks, the provided tips and suggestions can be broadly applied to other wireless networks as well.


The 2009 Identity Fraud Survey Report, released by Javelin Strategy & Research on Feb 9th, 2010, confirms that the number of identity fraud victims has increased 22 percent over the previous year to 9.9 million adults in the United States. A large portion of these victims lost their identities because institutions and agencies similar to our own University of South Carolina mishandled the victim's personal data. To help mitigate this threat, while protecting ourselves, faculty, staff and students, we can educate all parties involved on how to securely remove sensitive data from our personal computers. These instructional videos aim to inform us on the topic of securely deleting sensitive data with freely available tools.

Locating Sensitive Data (3:05): Information contained in this video, while specifically intended for Windows users, is also generally applicable to Mac users.

Locating Credit Card Data (3:00): Information in this video is intended for Windows, Mac, and Linux users.

Secure Deletion of Files: Mac (1:39): Information contained in this video is intended for Mac users.

Secure Deletion of Files: Windows (2:26): Information contained in this video is intended for Windows users.


Lunch and Learn Training Videos

Open Source Intrusion Detection - March 14
This is the recorded version of the March 14th primer on open source intrusion detection. The session presented collecting and reviewing security related logs with as little effort and budget as possible.

Suggested Reading

Suggested Viewing/Listening

  • IT Security OPML file of suggested podcasts - This file contains a number of feeds that you can import into most Podcast Players or such as iTunes, Miro, or your preferred feed reader. Import it, keep the feeds you like, delete the ones you don't.
  • Identity Theft: Why It Should Matter to You! - This video created by the SC Department of Consumer Affairs is intended to inform students how identify theft can ruin their day!

Security for Developers

Information Security Industry Published Standards

 
Safety/Emergency Information Directory: Find People        Map: Find Places        Calendar: Find Events        VIP        my.sc.edu Contact and Site Information
Columbia, SC 29208 • 803-777-1800 • Webmaster © University of South Carolina Board of Trustees