Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn


Thursday, July 31, 2014

  New Resources
Travel Tips for Data Security
Free Security/Privacy Training Resources
Two-step verification
Combating Malware
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Wireless Networking
Encryption & digital signatures
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
  More in-depth information for
Local support providers
System administrators
  Security initiatives
Critical host compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
  Related links
Electronic privacy
Worms, trojans, backdoors

One Step Ahead: Almanac Security Tips - 2014

In each issue, Penn's Journal of Record, The Almanac publishes helpful tips and hints for dealing with information security and privacy matters. This page is a collection of all those published thus far.
New! You can now receive new One-Step-Ahead Security and Privacy Tips automatically!
You can subscribe via Email or RSS.

Table of Contents (view all)

Heartbleed OpenSSL Vulnerability
Security and Privacy Tips for World Travelers
Filing Taxes Online This Year? Take Steps to Protect Your Information!
If your computer runs Windows XP, you must update it now!
Why Should You Report Security Incidents? And How Do You Report One?
Photo and Video Privacy Issues
The Password is Dead, Long Live the Password!
Data Privacy Month: NSA Surveillance Panel at the National Constitution Center
Protecting Your Finances During This Yearís Holiday Shopping Season
Beware of Phishing E-mails in the Wake of Typhoon Haiyan
No E-mail from Penn Will Ask For Your Username/Password or SSN
The Children's Online Privacy Protection Act: Does It Apply to Your Website?
October: National Cyber Security Awareness Month; Free Secure Disposal of Paper and Electronics
What Basic Rules Protect Student Information at Penn? (September 2013)
Protecting Privacy and Security on Penn + Box

Whats popular?

   wireless    www    documents    privacy    mobile devices    security    keyloggers    hackers    social networking        virus    home computing    phishing    passwords    identity theft    software    SSNs    email

Tuesday, December 10, 2013 - Almanac Vol. 60, No. 16

Protecting Your Finances During This Yearís Holiday Shopping Season

Growth of online purchases continues to outpace growth of sales at traditional "brick and mortar" outlets with 2013 online buying expected to increase by more than 15% over 2012. Regardless of how you choose to shop this holiday season, being vigilant and following a few simple precautions can help protect your finances:

  • When shopping online, check for https:// or a locked padlock in your web browser to give you the assurance that youíre using a "secure server" site.
  • Use trusted computers and networks (e.g., ones you own and maintain) for online shopping.
  • When shopping offline, watch to see if credit cards are taken away from the counter and/or out of your sight when your purchases are being authorized. If you canít see your card or the clerk, you donít know if your card information is being written down surreptitiously.
  • Use credit cards instead of debit cards. The maximum liability for unauthorized charges on a credit card is $50. The liability for unauthorized use of a debit card can drain your bank account immediately which can lead to bounced checks or missed payments. In addition, liability for unauthorized debit card purchases can be much higher than the $50 maximum on credit cards, depending upon when you report the loss.
  • Use credit cards instead of writing checks. Checks can easily be altered to change the payee and amount. If you do find yourself writing checks, use a pen with pigment-based rather than water-based ink, and either write the payee name yourself or ask that the store stamp be applied in your presence.

A final caution in these times of heightened credit awareness: under Federal law, you are entitled to one free credit report from each of the three major credit reporting agencies per year. For the report to be truly free, without qualification, you must visit which is the official provider of free credit reports authorized by the Federal Trade Commission.


Information Systems and Computing
University of Pennsylvania
Comments & Questions

Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania