Skip to main content

IT Students Share Strategies for Staying Safe Online

William C. Blessing talks about the malicious methods employed to compromise computer security.
William C. Blessing talks about the malicious methods employed to compromise computer security.
Zachary L. Lundberg addresses the benefits (and more than occasional pitfalls) of geolocation, which pinpoints and shares one's physical whereabouts.
Zachary L. Lundberg addresses the benefits (and more than occasional pitfalls) of geolocation, which pinpoints and shares one’s physical whereabouts.
Several "cloud"-based systems for information backup are assessed by Adam T. Check.
Several “cloud”-based systems for information backup are assessed by Adam T. Check.
David M. Mossop (left) and Jeremy W. Rennicks cover multiple security considerations, including password strength, wireless security and the endless shelf life of Internet posts.
David M. Mossop (left) and Jeremy W. Rennicks cover multiple security considerations, including password strength, wireless security and the endless shelf life of Internet posts.

Members of Penn College’s Information Security Association observed Data Privacy Month on Wednesday with brief presentations on relevant topics about online protection. Intended mainly as a peer-to-peer supplement to the introductory Information, Technology and Society course, the afternoon program included valuable tips for anyone concerned about his or her digital footprint. Sharing their knowledge in the Student & Administrative Services Center were William C. Blessing, of Muncy; Zachary L. Lundberg, of Warren; Adam T. Check, of Great Falls, Virginia; David M. Mossop, of Newark, Delaware; and Jeremy W. Rennicks, of Williamsport. Blessing is enrolled in the information technology: network security concentration; the others major in information technology: information assurance and security concentration.