Kent State | Information Services Secure IT

Welcome to

Tip of the Week:

Sensitive Data Can Become Vulnerable When Accessed Through Public Computers. Never Access Workplace Information In These Locations.

Whether you are in a café or a hotel's business center, the computers you use may not be secured properly. The computers in these public centers may be infected with malicious software or could otherwise have serious security vulnerabilities. You may even accidentally leave confidential or sensitive information on the computer after you're done. Only use your own computer when you need to work away from the office.

Cyber Security Scramble Answers

If you are phishing for the answers to our latest stater ad, look no further.

Answers: spam, hackers, threat, identity, phish in the sea


According to the Federal Trade Commission, phishing is when “internet fraudsters impersonate a legitimate organization to trick you into giving out your personal information.”

Learn More


Short for "malicious software," malware is hostile or intrusive software used by hackers to gain access to and retrieve sensitive information from personal computer, phones, and mobile devices.

Learn More

Password Security

Password Security is an important procedure in ensuring your online security. Click the link below to view some of the different steps involved in protecting and selecting the password.

Learn More

Identity Protection

Identity theft is a crime in which an imposter obtains key pieces of personal information, such as Social Security or driver's license numbers, in order to impersonate someone else. Click Below for important steps to protect yourself.

Learn More

Subscribe to RSS