News and Updates

How Burglers Use Social Media

July 11, 2016  |  See how burglars use your social media posts to commit crime...

Protecting Your Portable Devices

June 21, 2016  |  The feature that makes portable computing and data storage devices so attractive is also their critical weakness...

The UMB Mobile App: More Than You Know!

May 18, 2016  |  Unless you are already a regular user of Mobile UMB, it is likely that this easily-downloadable free app provides more functionality than you expect.

UMB Cybersecurity Conference Proceedings

April 22, 2016  |  Materials from the recent UMB Cybersecurity Conference

Student User-Friendly System (SURFS)

January 19, 2016  |  o comply with new federal and state laws, SURFS was updated to capture...

Children's Health Systems

January 19, 2016  |  A number of web application development projects, in support of children's health and welfare...

Picking and Protecting Passwords

September 8, 2015  |  Biometrics are rapidly making inroads, but at this point passwords remain the most common method of identity verification in the virtual world.

Safer Web Browsing

August 13, 2015  |  The vast majority of computer security compromises begin with someone clicking a link on a web page and thereby collecting a virus...

Protecting Your Identity

July 27, 2015  |  Modern life offers the convenience of not having to be physically present to interact with others.

CITS Milestones

June 15, 2015  |  When the Center for Information Technology Services is doing a major system implementation such as Kuali-Coeus or Electronic Timesheets...

<< < 1 2 3 4 5 6 7 8 9 10 > >>