AgriLife Information Technology

  • Spooky Social Media

    This week we’re covering the scary world of social media! Here are 7 things to keep in mind while you scroll… There is No Delete Button While you can delete a photo or post on social media platforms such as Twitter, Instagram, Facebook and TikTok, you cannot delete it from…

  • Chilling Cybercrime

    While the internet can be a scary place, so can your mailbox, as scammers hone their craft. This week we will cover the 3 most common cybercrimes and how you can identify them. Identity Theft  What is Identity Theft? Identity (ID) theft happens when someone steals your personal information to…

  • Phantom Personal Devices

    October is National Cybersecurity Awareness Month, and AIT wants to ensure you are aware of all the spooky parts of the cyber world!  We will post a new topic every Friday in October, so come back every Friday for a new fright!   Here are the topics we will cover…

  • Pig Butchering Crypto Scam

    What is it? The pig butchering scam refers to cases when scammers use fake profiles and infiltrate dating apps and social media in order to target and lure victims into investing in elaborate crypto investment scams. The name comes from the way in which the scammers feed the victims with…

  • Duo “Remember Me” Option Change

    What is changing? This change was mandated by the TAMUS System Chief Information Security Officer (SCISO), in response to a newly discovered security threat targeting MFA systems, like DUO. You can read more about the updated TAMU System Security Control standard here. What does this mean for you? If you…

  • 5 Ways Social Engineers Crack into Human Beings

    Social engineering is…  the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes . A “phishing” email is one of the most common and effective types of social engineering attacks.  Social engineers leverage the following human traits to exploit their…