AgriLife Information Technology

  • Black Friday & Cyber Monday- Is That Deal too Good to be True?

    According to research conducted by leading cybersecurity company, Bitdefender– 56% of all Black Friday spam (by volume) received between Oct 26 and Nov 9 was marked as a scam The same study found that the highest percentage of spam emails were sent to recipients located in the US. Common Black…

  • The Mobile Banking Monster

    The final fright of Cybersecurity month is something we use on a daily basis- mobile banking. According to a 2022 Forbes Advisor survey, 78% of Americans prefer to bank digitally Since so many people use their devices to manage their money, we thought we should cover 3 important tips to…

  • Spooky Social Media

    This week we’re covering the scary world of social media! Here are 7 things to keep in mind while you scroll… There is No Delete Button While you can delete a photo or post on social media platforms such as Twitter, Instagram, Facebook and TikTok, you cannot delete it from…

  • Chilling Cybercrime

    While the internet can be a scary place, so can your mailbox, as scammers hone their craft. This week we will cover the 3 most common cybercrimes and how you can identify them. Identity Theft  What is Identity Theft? Identity (ID) theft happens when someone steals your personal information to…

  • Phantom Personal Devices

    October is National Cybersecurity Awareness Month, and AIT wants to ensure you are aware of all the spooky parts of the cyber world!  We will post a new topic every Friday in October, so come back every Friday for a new fright!   Here are the topics we will cover…

  • Can you do me a favor?  

    Have you recently received an email from your “boss” with this in the subject line or body? A text from your “regional director” asking you “to do something important real quick?” Did the sender ask you for a mobile contact number and then to buy them gift cards? Then you…

  • Pig Butchering Crypto Scam

    What is it? The pig butchering scam refers to cases when scammers use fake profiles and infiltrate dating apps and social media in order to target and lure victims into investing in elaborate crypto investment scams. The name comes from the way in which the scammers feed the victims with…

  • Software End of Life

    What is End of Life? All software has a lifecycle. It begins when the software is released, continues through the support phase, and ends with the software no longer supported. End of Life (EOL) Software is software that is no longer actively supported by the developer. This means that the…

  • Plus Addressing- Adding Something Extra to your Emails

    About Plus Addressing, also known as sub-addressing, allows you to create a disposable email address that you can use to receive particular emails. It can make sorting messages using Rules in your mailbox much easier. It can also provide added protection as it doesn’t use your actual email address. How…

  • Fixing the Cracks in your Window to the Internet (Web Browser Updates)

    Your web browser is the window that you use to view and interact with websites every day. Naturally, this makes it a frequent target of malicious parties. If the attacker can break and control the browser, then they can manipulate all interactions with websites or even take over the entire…