Information Technology

SANS Institute OUCH

Over the years, many people have asked many questions about using Information Technology securely and safely. I've done my best to answer these questions. For instance, what should I do if someone asks me for my password. My answer is the person asking is either incompetent or a thief. No competent system administrator needs your password. A thief wants to steal something from you. The answer is do not give out your password, even to your Information Technology instructor.

The SANS Institute created the OUCH magazine and graciously allows us to redistribute the magazines. Select the link below to learn more about the topic that interests you. Additional articles and translations may be found at the OUCH web site.

2024 Articles


Unveiling the Shadows: How Cyber Criminals Steal Your Passwords
Don't Let Cybercriminals Swipe Your Savings: Lock Down Your Financial Accounts!
How to Outwit Malicious Mobile Apps
Phantom Voices: Defend Against Voice Cloning Attacks

Guard Your Heart (and Wallet) Against Romance Scams
Text Messaging Attacks: A Smishing Saga
Going on Vacation? Simple Steps to Make it Cybersecure
Top Three Ways Cyber Attackers Target You
Start Your Career in Cybersecurity
Messaging Do�s and Don�ts.
Identity Theft: Preventing, Detecting, and Responding
QR Codes

2023 Articles

The Power of the Passphrase
I'm Hacked, Now What?
The Power of Updating
Online Security for Kids
Power of Password Managers
Stop Those Phone Call Scams
Securing Your Financial Accounts
Artificial Intelligence: What to know
Scareware: A Story
Digital Spring Cleaning in 7 Simple Steps
Do I need Security Software?
Biometrics - Making Security Simple

2022 Articles

Disposing of Your Mobile Device
Browsers
Emotional Triggers - How Cyber Attackers Trick You
got backups
Charity and Disaster Scams
Phishing Attacks Are Getting Trickier
Securely Gaming Online
Top Three Social Media Scams
Learn a New Survival Skill: Spotting Deepfakes
Anyone Can Start a Career in Cybersecurity
Spot and Stop Messaging Attacks

2021 Articles

Top Cybersecurity Tips For Vacations
Shopping Online Securely
Emails Do's and Don'ts
One of the Most Important Steps You Can Take to Secure Your Accounts: Two-Factor Authentication
Using the Cloud Securely
Securing Your Mobile Devices
Securely Using Mobile Apps
Vishing: Phone Call Attacks & Scams
Privacy - Protecting Your Digital Footprint
Identity Theft
I'm Hacked, Now What?
Protecting Your Wi-Fi at Home

2020 Articles

Securing The Generation Gap
Social Engineering
Fake News
Online Security for Kids
Virtual Conferencing Safely and Securely
Ransomware

Creating a Cyber Secure Home
The Power of Updating
Password Managers
Coronavirus Updates from SANS
 Top 5 Steps to Securely Work from Home
 Social Engineering Video
 Email and Phishing Video
 Working Remotely Video
 Creating a Cyber Secure Home Video
 SANS Videos in other languages

Spring Cleaning
Social Media Privacy

Digital Inheritance


2019 Articles

Messaging / Smishing
Shopping Safely & Securely Online
Four Simple Steps to Staying Secure
Scamming You Through Social Media
Got Backups?
Virtual Private Networks (VPN)
Dark Web
A Career in Cybersecurity
Making Passwords Simple
Securely Disposing Your Mobile Devices
Personalized Scams
Search Yourself Online

2018 Articles

Yes, You Are a Target
Am I Hacked?
Do's and Don'ts of Email
CEO Fraud
Smart Home Devices
Phone Call Attacks and Scams
Stop That Malware
GDPR (European Privacy Rules)
 SANS Facebook Options
Stop That Phish
Top Tips to Securely Using Social Media
Securing Your Mobile Devices
Creating a Cybersecure Home

2017 Articles

Lock Down Your Login
Shopping Online Securely
  SANS Recommendations after the Equifax Hack
Helping Others Secure Themselves
Password Managers
Backups and Recovery
Gamining Online Safely & Securely
Lessons from WannaCry

Securing Today's Online Kids
Passphrases
Securely Using Mobile Apps
Staying Secure on the Road
Social Engineering

2016 Articles

Disposing Your Mobile Device Securely
Using the Cloud Securely
Four Steps to Staying Secure
Email Do's and Don'ts
Ransomware
CEO Fraud
Encryption
Internet of Things (IoT)
I'm Hacked, Now What?
What is Malware?
Securing Your Home Network
Securing Your New Tablet

2015 Articles

Phishing
Shopping Online Securely
Password Managers
Two-Step Verification
Backup & Recovery
Social Media
Educating Kids on Cyber Safety
Securing the Cyber Generation Gap
Passphrases
Gaming Online Safely & Securely
Staying Secure on the Road
Securely Using Mobile Apps

2014 Articles

Securing Your Home Network
What Is Malware
The End of Windows XP
Yes, You Actually Are A Target
Heartbleed - Why Do I Care?
i'm Hacked, Now What?
Disposing of Your Mobile Device
Email Do's and Don'ts
Encryption
Using the Cloud Securely
Five Steps to Staying Secure
Social Engineering
What is Anti-Virus?

2013 Articles

Java
Email Phishing Attacks
Social Networking Safely
Protecting Your Kids Online
Passwords
URL Shorteners and QR Codes
Spear Phishing
Two-Step Verification
Personal Backup and Recovery
Password Managers
How to Shop Online Securely
Securing Your New Tablet

2012 Articles

Secure your Wi-Fi Network
Securing Your Mobile Device Apps
E-mail Dos and Don'ts
Metadata
Safely Disposing of Your Mobile Device
Using the Cloud Safely
The Tech-Support Phone Call Scam
Counterfeit Websites
Hacked:Now What?
Losing Your Mobile Device
Two-Factor Authentication
Seven Steps to a Secure Computer

2011 Articles

Email Phishing and Scan
Browser Security and Privacy
Backup and Recovery
Social Networking Safety
Updating Your Software
Understanding Encryption
Protecting Your Kids Online
Protecting Your Passwords
Staying Secure Online While Traveling
Understanding Anti-Virus Software
Using Your Smartphone Securely!

Computer File Hashes

 SHA2-512 computer file hashes for SANS OUCH documents
 SHA3-256 computer file hashes for SANS OUCH documents
 SHA3-512 computer file hashes for SANS OUCH documents

Send e-mail to Mr. Preuss



Return to Home Page

Originally Created: December 16, 2011
Modified: November 2, 2024
Contact Webmaster