AgriLife Information Technology

  • Can you do me a favor?  

    Have you recently received an email from your “boss” with this in the subject line or body? A text from your “regional director” asking you “to do something important real quick?” Did the sender ask you for a mobile contact number and then to buy them gift cards? Then you…

  • Pig Butchering Crypto Scam

    What is it? The pig butchering scam refers to cases when scammers use fake profiles and infiltrate dating apps and social media in order to target and lure victims into investing in elborate crypto investment scams. The name comes from the way in which the scammers feed the victims with…

  • Software End of Life

    What is End of Life? All software has a lifecycle. It begins when the software is released, continues through the support phase, and ends with the software no longer supported. End of Life (EOL) Software is software that is no longer actively supported by the developer. This means that the…

  • Plus Addressing- Adding Something Extra to your Emails

    About Plus Addressing, also known as sub-addressing, allows you to create a disposable email address that you can use to receive particular emails. It can make sorting messages using Rules in your mailbox much easier. It can also provide added protection as it doesn’t use your actual email address. How…

  • Fixing the Cracks in your Window to the Internet (Web Browser Updates)

    Your web browser is the window that you use to view and interact with websites every day. Naturally, this makes it a frequent target of malicious parties. If the attacker can break and control the browser, then they can manipulate all interactions with websites or even take over the entire…

  • Ukrainian-related Phishing and Russian-based Attacks

    There has been a noticeable uptick in phishing emails exploiting the sentiment surrounding the events in Ukraine. In the first week of March, there were over 600 quarantined phishing emails referencing Ukraine. Most of these emails advertised t-shirts and stickers to support the cause, or shared misinformation articles to trick…

  • Common Phishing Tactics

    Phishing is… the crafting of an email that appears real to trick you into clicking a link in an email or share sensitive information with a malicious party Mimicked Login Sites The most common phishing emails seek to create urgency by warning you about an impending negative event such as:…

  • AgriLife IT Best Practices

    New Year, New Resolutions! This is the perfect opportunity to take some time to review AgriLife IT’s Best Practices when it comes to IT Services. Click the links below to go to a specific section, or scroll through them all! AgriLife AgNet Account Our password policy and reset process changed…

  • Shopping Safely this Holiday Season

    The holiday season is always lucrative for hackers, scammers, and online thieves. While millions will be scouring the internet for the best in-stock gifts and deals, attackers will be looking to take advantage of unsuspecting shoppers by finding weaknesses in their devices, networks, or attempting to extract information through fake…

  • How Stagnant Devices Impact Everyone

    All hardware is subject to a lifecycle: Acquisition Use/Support Retirement When many of us receive a new device, we tend to squirrel away the old device into a drawer or closet for a rainy day. We justify this by saying that it is wise to have a spare device. The…