AgriLife Information Technology

  • AgriLife IT Best Practices

    New Year, New Resolutions! This is the perfect opportunity to take some time to review AgriLife IT’s Best Practices when it comes to IT Services. Click the links below to go to a specific section, or scroll through them all! AgriLife AgNet Account Our password policy and reset process changed…

  • Shopping Safely this Holiday Season

    The holiday season is always lucrative for hackers, scammers, and online thieves. While millions will be scouring the internet for the best in-stock gifts and deals, attackers will be looking to take advantage of unsuspecting shoppers by finding weaknesses in their devices, networks, or attempting to extract information through fake…

  • How Stagnant Devices Impact Everyone

    All hardware is subject to a lifecycle: Acquisition Use/Support Retirement When many of us receive a new device, we tend to squirrel away the old device into a drawer or closet for a rainy day. We justify this by saying that it is wise to have a spare device. The…

  • Trick or Treat! Phishing- It’s Always a Trick

    Phishing has been plaguing email users since 1996, and it is not going away any time soon. Email protection and filtering have evolved and become extremely intelligent, but so have the phishing campaigns. Malicious individuals create more than 1.5 million new phishing sites each month and phishing accounted for over…

  • Don’t Get CAPTCHA’d By This New Phishing Technique!

    Microsoft warns that attackers are now employing a more sophisticated email phishing attack technique. The attack uses links that redirect to a CAPTCHA page before again redirecting to a realistic-looking login website to get you to enter your credentials twice. Multiple redirects and the CAPTCHA page used in this type…

  • Duo “Remember Me” Option Change

    What is changing? This change was mandated by the TAMUS System Chief Information Security Officer (SCISO), in response to a newly discovered security threat targeting MFA systems, like DUO. You can read more about the updated TAMU System Security Control standard here. What does this mean for you? If you…

  • Malvertising Attacks

    What is a malvertising attack? A malvertising attack occurs when a legitimate website you are visiting loads a malicious piece of code embedded in an advertisement. Typically, the attack tries to trick the user into performing an action that the bad actors need in order to gain control of the…

  • Why should I leave my computer on all the time?

    Why do IT professionals keep asking computer users to keep their devices powered on all the time?Contrary to popular belief, it is not to annoy users- there is a good reason for it. Isn’t keeping my computer off when not in use better for it? You may think that you…

  • 5 Ways Social Engineers Crack into Human Beings

    Social engineering is…  the use of deception to manipulate individuals into divulging confidential or personal information that may be used for fraudulent purposes . A “phishing” email is one of the most common and effective types of social engineering attacks.  Social engineers leverage the following human traits to exploit their…