Information Technology

SANS Institute OUCH

Over the years, many people have asked many questions about using Information Technology securely and safely. I've done my best to answer these questions. For instance, what should I do if someone asks me for my password. My answer is the person asking is either incompetent or a thief. No competent system administrator needs your password. A thief wants to steal something from you. The answer is do not give out your password, even to your Information Technology instructor.

The SANS Institute created the OUCH magazine and graciously allows us to redistribute the magazines. Select the link below to learn more about the topic that interests you. Additional articles and translations may be found at the OUCH web site.

2019 Articles

Shopping Safely & Securely Online
Four Simple Steps to Staying Secure
Scamming You Through Social Media
Got Backups?
Virtual Private Networks (VPN)
Dark Web
A Career in Cybersecurity
Making Passwords Simple
Securely Disposing Your Mobile Devices
Personalized Scams
Search Yourself Online

2018 Articles

Yes, You Are a Target
Am I Hacked?
Do's and Don'ts of Email
CEO Fraud
Smart Home Devices
Phone Call Attacks and Scams
Stop That Malware
GDPR (European Privacy Rules)
 SANS Facebook Options
Stop That Phish
Top Tips to Securely Using Social Media
Securing Your Mobile Devices
Creating a Cybersecure Home

2017 Articles

Lock Down Your Login
Shopping Online Securely
  SANS Recommendations after the Equifax Hack
Helping Others Secure Themselves
Password Managers
Backups and Recovery
Gamining Online Safely & Securely
Lessons from WannaCry

Securing Today's Online Kids
Passphrases
Securely Using Mobile Apps
Staying Secure on the Road
Social Engineering

2016 Articles

Disposing Your Mobile Device Securely
Using the Cloud Securely
Four Steps to Staying Secure
Email Do's and Don'ts
Ransomware
CEO Fraud
Encryption
Internet of Things (IoT)
I'm Hacked, Now What?

What is Malware?

Securing Your Home Network
Securing Your New Tablet

2015 Articles

Phishing
Shopping Online Securely
Password Managers
Two-Step Verification
Backup & Recovery
Social Media
Educating Kids on Cyber Safety
Securing the Cyber Generation Gap
Passphrases
Gaming Online Safely & Securely
Staying Secure on the Road
Securely Using Mobile Apps

2014 Articles

Securing Your Home Network
What Is Malware
The End of Windows XP
Yes, You Actually Are A Target
Heartbleed - Why Do I Care?
i'm Hacked, Now What?
Disposing of Your Mobile Device
Email Do's and Don'ts
Encryption
Using the Cloud Securely
Five Steps to Staying Secure
Social Engineering
What is Anti-Virus?

2013 Articles

Java
Email Phishing Attacks
Social Networking Safely
Protecting Your Kids Online
Passwords
URL Shorteners and QR Codes
Spear Phishing
Two-Step Verification
Personal Backup and Recovery
Password Managers
How to Shop Online Securely
Securing Your New Tablet

2012 Articles

Secure your Wi-Fi Network
Securing Your Mobile Device Apps
E-mail Dos and Don'ts
Metadata
Safely Disposing of Your Mobile Device
Using the Cloud Safely
The Tech-Support Phone Call Scam
Counterfeit Websites
Hacked:Now What?
Losing Your Mobile Device
Two-Factor Authentication
Seven Steps to a Secure Computer

2011 Articles

Email Phishing and Scan
Browser Security and Privacy
Backup and Recovery
Social Networking Safety
Updating Your Software
Understanding Encryption
Protecting Your Kids Online
Protecting Your Passwords
Staying Secure Online While Traveling
Understanding Anti-Virus Software
Using Your Smartphone Securely!

Computer File Hashes

 SHA2-512 computer file hashes for SANS OUCH documents
 SHA3-256 computer file hashes for SANS OUCH documents
 SHA3-512 computer file hashes for SANS OUCH documents

Send e-mail to Mr. Preuss



Return to Home Page

Originally Created: December 16, 2011

Modified: October 2, 2019

Contact Webmaster