Tech Bytes

Computer

Who’s really to blame in a cybersecurity attack?

Oops – Todd just clicked on a link in his work email that he thought was from a trusted source, asking for him to reset his password. Todd doesn't know it yet, but he's just fallen victim to a phishing attack and now his entire organization could be…

Tags:

Briefs tag
Students walk through the Student Pavilion

2021 Year in Review

UTO's 2021 Year in Review publication is here! Flip through snapshots, take a closer look at the year's big stories and more.

Tags:

Features tag
Person looking at infosec tips at his computer

5 tips to avoid phishing scams at ASU

Cybersecurity is a 24/7 pursuit at ASU as we aim to keep our community protected and informed. Voice or phone phishing is where bad actors may spoof one of our ASU phone numbers in an attempt to voice phish for personal information. We want to take…

Tags:

Briefs tag
Participants of the Digital Trust Summit on a panel in Zoom. Learn more about ASU's Digital Trust Summit: https://tech.asu.edu/events/digital-trust-summit-2022

Navigating the future of cybersecurity and trust: top 5 challenges and opportunities

200 global cybersecurity professionals identify ‘security equity’ and ‘redesigning consent’ as moving targets for the field at ASU’s 2022 Digital Trust Summit. For many, our internet-connected devices know more about us than our closest friends.…

Tags:

Features tag
event

Calling all faculty: the 2023 ASU EdTech Open Houses are underway!

In an effort to keep pace with the rapidly evolving digital landscape, instructors are participating in a series of workshops designed to explore the latest teaching tools and platforms. The goal: create engaging, collaborative learning environments…

Tags:

Features tag

UTO Minute - January

The referenced media source is missing and needs to be re-embedded.

Tags:

Briefs tag