Skip to main content

Secondary navigation:

Information Technology Services

Protect Your Identity, Credit Card Information, and Computer

security credentials

Learn how to protect your identity, credit card information, and computer.

Are your identity and credit card information safe?

Phishing is when you receive an email that appears to be from a well-known company, but is actually attempting to steal your credit card numbers and other personal information!


Are your online activities being watched?

Spyware is a type of malware that is installed on computers and collects little bits of information at a time about users without their knowledge. The presence of spyware is typically hidden from the user, and can be difficult to detect. Typically, spyware is secretly installed on the user's personal computer. Sometimes, however, spywares such as keyloggers are installed by the owner of a shared, corporate, or public computer on purpose in order to secretly monitor other users.

Read the full definition from Wikipedia.

 

How do I remove malware and spyware from my Windows computer?

Learn how to install and use Malwarebytes software (free), which can detect and remove malware, including spyware and adware, from your Windows computer.

Note: It is recommended that you clean your computer after removing malware by using CCleaner (free) for Windows.

 

Is your computer safe from viruses?

An unprotected computer can become infected within 15 minutes of being on the Internet. Do not let your computer be a target!

 

Are your documents and files easily accessible to others?

Use of unsecured wireless networks can put you at risk.

Wireless networks broadcast and retrieve data through the air using radio frequencies, similar to those used by cordless phones. Data, such as credit card numbers, passwords, email or instant messages, transmitted “in the clear” over an unencrypted wireless service can be intercepted and viewed by a malicious user without your knowledge. Data that is submitted via an unsecure Web site or application is even more vulnerable. We recommend that you use the BC secure wireless network (BC sign-in required).

When you are connected to file-sharing programs for music, games, or software, you may unknowingly allow others to copy private files you never intended to share.

 

Want to learn more?

Learn more about protecting yourself online from stopthinkconnect.org.

Note: The Anti-Phishing Working Group (APWG) and National Cyber Security Alliance (NCSA) led the development of the STOP. THINK. CONNECT. campaign. The U.S. Department of Homeland Security provides the Federal Government's leadership for the STOP. THINK. CONNECT. campaign.