Kindly exercise caution in light of a phishing email currently circulating within our university community. The subject line reads as follows: “LUC APPROVED PART TIME EMPLOYMENT OFFER.” This fraudulent communication falsely suggests available positions at Loyola, seeking individuals characterized as “Highly intelligent and organized” to provide both personal and administrative support. It’s essential to note […]
Dear Loyola Community, On approximately November 17, 2023, Athletic Trainer Systems (“ATS”) notified Loyola University Chicago (“Loyola”) and Select Physical Therapy (“SPT”) of a data security incident. Since 2013, Loyola has retained SPT (and its predecessor, NovaCare) to provided athletic trainers to work with Loyola’s student athletes. As part of such work, SPT’s trainers log […]
In today’s digital age, cybersecurity is becoming increasingly important, especially for college students. With so much of our daily lives being conducted online, it’s important to understand the risks and take steps to protect ourselves. In this article, we will discuss some important cybersecurity safety tips for college students. Please see the link below: 2023 […]
Please see the link below for the 2023 January UISO Newsletter. 2023 January UISO Newsletter Preview of the Newsletter:
Once again we are seeing attempts to steal money from unsuspecting victims by giving away “free” musical instruments for a shipping fee. In all of these cases, there are no instruments and once the shipping fee is sent, the criminal gets away with your funds. Often once they get someone on the hook, they’ll ask […]
Strengthening Healthcare Data Security: The Role of Authentication in HIPAA Compliance In the rapidly evolving landscape of healthcare technology, safeguarding patient information is of utmost importance. The Health Insurance Portability and Accountability Act (HIPAA) sets the standard for protecting sensitive patient data, and one crucial aspect of compliance is authentication. This article explores the significance […]
Overview To create a secure home network, you need to start by securing your Wi-Fi access point (sometimes called a Wi-Fi router). This is the device that controls who and what can connect to your home network. Here are five simple steps to securing your home Wi-Fi to create a far more secure home network […]
Have I Been Hacked? No matter how secure you are, sooner or later you may have an accident and become hacked. Below are clues you might have been hacked and if so, what to do. Your Online Accounts Family or friends say they are receiving unusual messages or invites from you that you know you did not […]