State of Alaska, Department of Administration, Enterprise Technology Services

Departments >  Administration > ETS > Security > Monthly Newsletters

Monthly Newsletters

June 2014 What are Bots, Botnets and Zombies?
May 2014 Is malware a threat to mobile devices?
April 2014 Im Hacked, now what?
March 2014 Protect yourself from online tax scams
February 2014 Personal backup and recovery of your data
January 2014 cyber security outlook
December 2013 Cyber Hygiene with the Top 20 Critical Security Controls
November 2013 Social Networking sites: Security and privacy issues
October 2013 Take the CIS Cyber Security Pledge
September 2013 Social Networking sites: Security and Privacy Issues
August 2013 JAVA exploits
July 2013 Using Wi-Fi: Connect with Care
June 2013 Keeping Senior Citezens Safe Online
May 2013 Do you know where your personal Information is
April 2013 Protect yourself from email phishing attacks
March 2013 Protect yourself from email tax scams
February 2013 How do I protect information on my smartphone
January 2013 Emerging Trends and Threats for 2013
December 2012 Cyber Crime and how it affects you
November 2012 National Cyber Security Month - Tips for secure shopping online during the holdiay shopping season
October 2012 National Cyber Security Month - Staying safe online
September 2012 Using encryption to protect data
August 2012 Securing your wireless network
July 2012 Managing your Digital Footprint: Think before you post.
June 2012 Social Engineering: You are at risk!
May 2012 Creating a Cyber-Secure Environment at Home
April 2012 Creating a Secure Password
February 2012 Securing Your Web Browser
January 2012 Cyber Security Emerging Threats and Trends for 2012
December 2011 Stay Safe on Social Networking Sites
November 2011 Tips for Secure Shopping Online
October 2011 Cyber Security and You - Top Ten Tips
September 2011 Disaster Preparedness for Personal Information Assets
August 2011 Phishing Alerts:
Fake Traffic Tickets and False Credit Union Messages
July 2011 Cyber Crime:
How It Happens And How You Can Protect Yourself
June 2011 Securing Mobile Devices
May 2011 Cyber Bullying:
What You Need To Know To Keep Your Family Safe
April 2011 Phishing Alert: Epsilon Data Breach
March 2011 Safeguarding Your Personal Data
February 2011 Cyber Ethics
January 2011 Cyber Security Emerging Trends and Threats for 2011
December 2010 Increase in Java Exploits
November 2010 Online Holiday Shopping
August 2010 Protecting Children Online
July 2010 Protecting Data Contained in Copiers and Printers
June 2010 Home Personal Computer (PC) Maintenance for Windows Operating Systems
May 2010 Identiy Theft
April 2010 Security and Cloud Computing
March 2010 Security and Privacy on Social Networking Sites
February 2010 Backing Up Your Files
January 2010 Cyber Security Trends for 2010
December 2009 Automatic Software Updating and Patching
November 2009 Online Holiday Shopping Tips
September 2009 Cyber Ethics
August 2009 Cookies
July 2009 Cybercrime
June 2009 Security of Mobile Communication Devices
May 2009 Rogue (Fake) Anti-Virus Software: How to Spot It & Avoid It!
April 2009 Security of Credit Card Transactions
March 2009 Social Networking Sites: How to Stay Safe
February 2009 Cyber Security Trends for 2009
January 2009 Challenge or Secret Questions
December 2008 Pop-Ups
November 2008 Internet Shopping
October 2008 Phishing – How to Avoid Getting Hooked!
September 2008 Privacy
August 2008 Firewalls
July 2008 Web Browser Attacks
June 2008 Data Breach<
May 2008 Using Encryption to Protect Data
March 2008 Annual Maintenance of computers
January 2008 Securing Your Laptop