KEEP IT SAFE! KEEP IT SECURE!
HELLO! FROM THE PRIVACY & INFORMATION SECURITY DEPARTMENT
Welcome to our privacy and information security weekly newsletter. We thank you for allowing us this opportunity, BTW, we would love to hear your feedback on ways we can improve our informational content. Please checkout our website at: http://www.webster.edu/privacy-security/.

Comments? Email us at iso@webster.edu
MILITIA GROUP THAT PLANNED TO KIDNAP MICHIGAN GOVERNOR
According to the DOJ, this group used operational security measures, including encrypted messaging platforms, code words and phrases in an attempt to avoid detection.

WHAT IS END-TO-END ENCRYPTION?
Many services advertise E2EE, but not all of them actually offer it. Click here!
 
FIVE EYES RENEW CALLS FOR BACKDOORS IN SECURITY PRODUCTS
Federal law enforcement agencies from the U.S. and several of its closest allies cosigned a statement calling for tech manufacturers to provide law enforcement personnel a mechanism to pierce through encryption.
SPLIT SECOND "PHANTOM" IMAGES CAN FOOL TESLA'S AUTOPILOT
Researchers found they could stop a Tesla by flashing a few frames of a stop sign for less than a half second on an internet-connected billboard.
FREE POSTERS, TIP SHEETS, & VIDEOS-CYBER SECURITY ADVICE