World AIDS Day 2020, Ending the HIV/AIDS Epidemic: Resilience and Impact
Learn more about self-testing for HIV.
See if you qualify for Ready, Set, PrEP.
Learn more about the importance of viral supression.
In our January 31 blog, we highlighted 3 steps for creating a strong password with some ways to keep your computer and personal information safe. At last week’s U.S. Conference on AIDS, which focused on Ending the HIV Epidemic, we held a social media lab. This reminded us to share some ways to keep your computer and personal information safe. So the following are again some common potential security risks.
Hackers are always looking for new ways to breach your system or get you to unwittingly give up some of your personal information, so it’s a good idea to keep a list of these 5 types of security risks close at hand:
Never give out PII unless you know it is a verified, trusted and documented source and look for the “HTTPS” at the beginning of a website’s URL address to ensure that the connection is encrypted.
And, if by chance, you experience a security breach, here are several steps you can take to respond:
For more resources, check out our post on the difference between security and privacy and why it matters to your program.