{"id":45,"date":"2018-08-12T09:29:52","date_gmt":"2018-08-12T09:29:52","guid":{"rendered":"http:\/\/ww5.msu.ac.zw\/its\/?page_id=45"},"modified":"2019-02-01T11:34:34","modified_gmt":"2019-02-01T11:34:34","slug":"safe-computing","status":"publish","type":"page","link":"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/","title":{"rendered":"Safe Computing"},"content":{"rendered":"<h4>Protect Yourself from Computer viruses, spyware, scams &amp; spam<\/h4>\n<p>Computer viruses, spyware, and spam not only disrupt your work day with computer and network problems, but can result in identity theft. To avoid these problems, please follow these guidelines.<\/p>\n<ul>\n<li><strong>Do NOT open or preview any e-mail message that looks suspicious.<\/strong> If you open an e-mail message or see a pop-up window message and it is asking for personal or financial information, do NOT click on any links.<\/li>\n<li><strong>Protect your passwords and do NOT share them with anyone<\/strong>. Sharing account information with people you know or through <a href=\"http:\/\/en.wikipedia.org\/wiki\/Social_engineering_%28security%29\" target=\"_blank\" rel=\"noopener\">&#8220;social engineering&#8221;<\/a> are the most common reasons for identity theft. MSU will NEVER ask you for your passwords. If you fear an account may be compromised, change the password.<\/li>\n<li><strong>Control access to your machine.<\/strong><br \/>\nDon&#8217;t leave your computer in an unsecured, public area, especially if you&#8217;re logged on.\u00a0The physical security of your machine\u00a0is just as important as its technical security.<\/li>\n<li><strong>Be careful what you click<\/strong>\n<p>Avoid visiting unknown websites or downloading software from untrusted sources.\u00a0 These sites often host malware that will automatically, and often silently, compromise your computer.<\/li>\n<li><strong>Be conscientious of what you plug in to your computer<\/strong>\u00a0(flash drives and even smart phones can contain malware).<\/li>\n<li><strong>Always log out\u00a0<\/strong>&#8211; Don&#8217;t leave yourself logged in to any account that you are not actively using. \u00a0If you leave yourself logged in to a campus computer, the next person to sit down at that computer can gain access to your email, print credits etc. \u00a0You should <strong>ALWAYS<\/strong> log out of secure websites when your are finished using them. \u00a0You don&#8217;t want unauthorized people accessing any account you were previously accessing such as bank accounts, online retail accounts, email accounts etc.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Protect Yourself from Computer viruses, spyware, scams &amp; spam Computer viruses, spyware, and spam not only disrupt your work day with computer and network problems, but can result in identity [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"ngg_post_thumbnail":0,"pgc_sgb_lightbox_settings":"","footnotes":""},"categories":[],"tags":[],"featured_image_urls":{"full":"","thumbnail":"","medium":"","medium_large":"","large":"","1536x1536":"","2048x2048":"","newsmag-single-post":"","newsmag-recent-post-big":"","newsmag-post-horizontal":"","newsmag-vertical-post":"","newsmag-post-grid":"","newsmag-post-grid-small":"","newsmag-recent-post-list-image":"","newsmag-slider-image":"","thumb_255x255":"","audioigniter_cover":""},"post_excerpt_stackable":"<p>Protect Yourself from Computer viruses, spyware, scams &amp; spam Computer viruses, spyware, and spam not only disrupt your work day with computer and network problems, but can result in identity theft. To avoid these problems, please follow these guidelines. Do NOT open or preview any e-mail message that looks suspicious. If you open an e-mail message or see a pop-up window message and it is asking for personal or financial information, do NOT click on any links. Protect your passwords and do NOT share them with anyone. Sharing account information with people you know or through &#8220;social engineering&#8221; are the&hellip;<\/p>\n","category_list":"Uncategorized","author_info":{"name":"Blessing Mashoko","url":"https:\/\/ww5.msu.ac.zw\/its\/author\/mashcom\/"},"comments_num":"0 comments","yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Safe Computing - Information Technology Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safe Computing - Information Technology Services\" \/>\n<meta property=\"og:description\" content=\"Protect Yourself from Computer viruses, spyware, scams &amp; spam Computer viruses, spyware, and spam not only disrupt your work day with computer and network problems, but can result in identity [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/\" \/>\n<meta property=\"og:site_name\" content=\"Information Technology Services\" \/>\n<meta property=\"article:modified_time\" content=\"2019-02-01T11:34:34+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/\",\"url\":\"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/\",\"name\":\"Safe Computing - Information Technology Services\",\"isPartOf\":{\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/#website\"},\"datePublished\":\"2018-08-12T09:29:52+00:00\",\"dateModified\":\"2019-02-01T11:34:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ww5.msu.ac.zw\/its\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Safe Computing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/#website\",\"url\":\"https:\/\/ww5.msu.ac.zw\/its\/\",\"name\":\"Information Technology Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ww5.msu.ac.zw\/its\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/#organization\",\"name\":\"Information Technology Services\",\"url\":\"https:\/\/ww5.msu.ac.zw\/its\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ww5.msu.ac.zw\/its\/wp-content\/uploads\/sites\/10\/2018\/08\/new-logo-2.png\",\"contentUrl\":\"https:\/\/ww5.msu.ac.zw\/its\/wp-content\/uploads\/sites\/10\/2018\/08\/new-logo-2.png\",\"width\":300,\"height\":90,\"caption\":\"Information Technology Services\"},\"image\":{\"@id\":\"https:\/\/ww5.msu.ac.zw\/its\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safe Computing - Information Technology Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/","og_locale":"en_US","og_type":"article","og_title":"Safe Computing - Information Technology Services","og_description":"Protect Yourself from Computer viruses, spyware, scams &amp; spam Computer viruses, spyware, and spam not only disrupt your work day with computer and network problems, but can result in identity [&hellip;]","og_url":"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/","og_site_name":"Information Technology Services","article_modified_time":"2019-02-01T11:34:34+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/","url":"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/","name":"Safe Computing - Information Technology Services","isPartOf":{"@id":"https:\/\/ww5.msu.ac.zw\/its\/#website"},"datePublished":"2018-08-12T09:29:52+00:00","dateModified":"2019-02-01T11:34:34+00:00","breadcrumb":{"@id":"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/ww5.msu.ac.zw\/its\/safe-computing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ww5.msu.ac.zw\/its\/"},{"@type":"ListItem","position":2,"name":"Safe Computing"}]},{"@type":"WebSite","@id":"https:\/\/ww5.msu.ac.zw\/its\/#website","url":"https:\/\/ww5.msu.ac.zw\/its\/","name":"Information Technology Services","description":"","publisher":{"@id":"https:\/\/ww5.msu.ac.zw\/its\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ww5.msu.ac.zw\/its\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ww5.msu.ac.zw\/its\/#organization","name":"Information Technology Services","url":"https:\/\/ww5.msu.ac.zw\/its\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ww5.msu.ac.zw\/its\/#\/schema\/logo\/image\/","url":"https:\/\/ww5.msu.ac.zw\/its\/wp-content\/uploads\/sites\/10\/2018\/08\/new-logo-2.png","contentUrl":"https:\/\/ww5.msu.ac.zw\/its\/wp-content\/uploads\/sites\/10\/2018\/08\/new-logo-2.png","width":300,"height":90,"caption":"Information Technology Services"},"image":{"@id":"https:\/\/ww5.msu.ac.zw\/its\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_action":{"enabled":false,"date":"2026-04-11 04:38:47","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"category"},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/pages\/45"}],"collection":[{"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/comments?post=45"}],"version-history":[{"count":5,"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/pages\/45\/revisions"}],"predecessor-version":[{"id":128,"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/pages\/45\/revisions\/128"}],"wp:attachment":[{"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/media?parent=45"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/categories?post=45"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ww5.msu.ac.zw\/its\/wp-json\/wp\/v2\/tags?post=45"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}