Search ResultsYour search found 22 hits
- May 2013 – Do You Know Where Your Personal Information Is?The amount of data on the Internet is staggering. As consumers of online services, we create information through our use of social media, online shopping, and many other activities. Public records are also a source of information about individuals, which can get posted online. It is important to be aware that once this data is online, that can be difficult to remove.
- June 2012 – Social Engineering: You are at Risk!The term “social engineering” refers to an attempt to gain access to information, primarily through misrepresentation, and often relies on the trusting nature of most individuals. Most users should be familiar with email phishing scams (a form of social engineering) and have been taught not to open attachments from unknown or untrusted sources or to visit untrusted web sites.
- April 2012 – Creating a Secure PasswordYour password is more than just a key to your computer or online account. It is a gateway to all of your important information. If your password falls into the wrong hands, a cyber criminal can impersonate you online, access your bank or credit card accounts, sign your name to online service agreements or contracts, engage in financial transactions, or change your account information.
- March 2012 – Mobile Apps: How To Use Them SafelyThe use of mobile applications (apps) is increasing in parallel with the increased use in mobile devices. According to Gartner, “Worldwide mobile application store revenue is projected to surpass $15.1 billion in 2011… and by 2014 over 185 billion applications will have been downloaded from mobile app stores.” The continued growth of mobile apps requires a spotlight on security. The risks include access to information such as physical location or contacts lists, as well as the ability for the apps to download malware, such as keyloggers or programs that eavesdrop on phone calls and text messages. Hackers are quickly learning how to harvest legitimate applications and repackage them with malicious code before selling/offering them on various channels. The Institute of Electrical and Electronics Engineers (IEEE), a global technical professional association, predicts that 2012 will see an upsurge in cell phone hacking through the use of mobile applications on smartphones.
- September 2012 – Using Encryption to Protect DataAccording to the Privacy Rights Clearinghouse, more than 19 million records have been involved in a data breach so far this year. Protection of data requires multiple layers of defense, and the use of encryption to secure sensitive data is a critical tool in this multi-layered approach. Encryption scrambles a message or file so only the sender and the authorized individual with the decryption key can decode it.
- Hawaii State Archives Social Media PoliciesContent The Hawai‘i State Archives (HSA), a division of the Department of Accounting and General Services (DAGS), maintains its social media accounts in an effort to promote accessibility and transparency. If you follow our accounts, you can expect postings regarding historical events, individuals and organizations from earliest recorded Hawaiian history through current times. Postings regarding […]
- April 2013 – Protect Yourself from Email Phishing AttacksIn the pre-Internet era, con men, also known as confidence men, would gain victims’ confidence through the use of deception, to defraud them. The same principles are being used today, only now to an even greater efficiency through the use of online scams. One of the most prolific means for online scamming is phishing.
- Legislative Reports Other Reports Aloha Stadium Planning Study Volume 1 – Executive Summary Volume 2 – Existing Conditions Volume 3 – Improvements Volume 4 – Revenue Enhancement Overview Annual Financial Reports Comprehensive Six-Year Plan to Repair and Maintain Public Schools in the State of Hawaii Narrative Report Attachment Annual Legislative Reports Goals and Objectives Information Privacy and […]
- December 2012 – Cyber Crime and How it Affects YouWhat is Cyber Crime? Cyber crime is a term that covers a broad scope of criminal activity using a computer. Some common examples of cyber crime include identity theft, financial fraud, web site defacements and cyber bullying. At an organizational level, cyber crime may involve.....
- Archives Month 2022Throughout the month of October, we invite all of you to our “Pāʻina in the Archives” to acquaint yourself with some of the great dinner parties of the past. Throughout the month we will be releasing thousands of pages of newly digitized materials, including a fabulous array of dinner invitations, menus from parties hosted by […]
« Previous 1 2 3 Next »