IT Students Share Strategies for Staying Safe Online

Published 02.26.2015

News
Information Technology
Student News
Industrial, Computing & Engineering Technologies News

William C. Blessing talks about the malicious methods employed to compromise computer security.Zachary L. Lundberg addresses the benefits (and more than occasional pitfalls) of geolocation, which pinpoints and shares one's physical whereabouts.Several "cloud"-based systems for information backup are assessed by Adam T. Check.David M. Mossop (left) and Jeremy W. Rennicks cover multiple security considerations, including password strength, wireless security and the endless shelf life of Internet posts.Members of Penn College's Information Security Association observed Data Privacy Month on Wednesday with brief presentations on relevant topicsĀ about online protection. Intended mainly as a peer-to-peer supplement to the introductory Information, Technology and Society course, the afternoon program included valuable tips for anyone concerned about his or her digital footprint. Sharing their knowledge in the Student & Administrative Services Center were William C. Blessing, of Muncy; Zachary L. Lundberg, of Warren; Adam T. Check, of Great Falls, Virginia; David M. Mossop, of Newark, Delaware; and Jeremy W. Rennicks, of Williamsport. Blessing is enrolled in the information technology: network security concentration; the others major in information technology: information assurance and security concentration.