Information Technology
SANS Institute OUCH
Over the years, many people have asked many questions about using Information Technology securely and safely. I've done my best to answer these questions. For instance, what should I do if someone asks me for my password. My answer is the person asking is either incompetent or a thief. No competent system administrator needs your password. A thief wants to steal something from you. The answer is do not give out your password, even to your Information Technology instructor.
The SANS Institute created the
OUCH magazine and graciously allows us to redistribute the
magazines. Select the link below to learn more about the topic
that interests you. Additional articles and translations may be
found at the OUCH
web site.
2026 Articles
Digital Inheritance
2025 Articles
Overwhelmed by Cybersecurity? Focus on the Core Four
2024 Articles
Unveiling
the Shadows: How Cyber Criminals Steal Your Passwords
Don't
Let Cybercriminals Swipe Your Savings: Lock Down Your
Financial Accounts!
How to
Outwit Malicious Mobile Apps
Phantom
Voices: Defend Against Voice Cloning Attacks
Guard
Your Heart (and Wallet) Against Romance Scams
Text
Messaging Attacks: A Smishing Saga
Going
on Vacation? Simple Steps to Make it Cybersecure
Top
Three Ways Cyber Attackers Target You
Start
Your Career in Cybersecurity
Messaging
Do’s and Don’ts.
Identity
Theft: Preventing, Detecting, and Responding
QR Codes
2023 Articles
The Power of the Passphrase
2022 Articles
Disposing
of Your Mobile Device
Browsers
Emotional
Triggers - How Cyber Attackers Trick You
got
backups
Charity
and Disaster Scams
Phishing
Attacks Are Getting Trickier
Securely
Gaming Online
Top
Three Social Media Scams
Learn
a New Survival Skill: Spotting Deepfakes
Anyone
Can Start a Career in Cybersecurity
Spot
and Stop Messaging Attacks
2021 Articles
Top
Cybersecurity Tips For Vacations
Shopping
Online Securely
Emails
Do's and Don'ts
One
of the Most Important Steps You Can Take to Secure Your
Accounts: Two-Factor Authentication
Using
the Cloud Securely
Securing
Your Mobile Devices
Securely
Using Mobile Apps
Vishing:Phone
Call Attacks & Scams
Privacy
- Protecting Your Digital Footprint
Identity
Theft
I'm
Hacked, Now What?
Protecting
Your Wi-Fi at Home
2020 Articles
Securing
The Generation Gap
Social
Engineering
Fake
News
Online
Security for Kids
Virtual
Conferencing Safely and Securely
Ransomware
Creating a
Cyber Secure Home
The Power of
Updating
Password Managers
Coronavirus Updates from SANS
Top
5 Steps to Securely Work from Home
Social
Engineering Video
Email
and Phishing Video
Working
Remotely Video
Creating
a Cyber Secure Home Video
SANS
Videos in other languages
Spring Cleaning
Social Media Privacy
Digital Inheritance
2019
Articles
Messaging
/ Smishing
Shopping
Safely & Securely Online
Four Simple
Steps to Staying Secure
Scamming
You Through Social Media
Got
Backups?
Virtual
Private Networks (VPN)
Dark Web
A Career in
Cybersecurity
Making
Passwords Simple
Securely
Disposing Your Mobile Devices
Personalized
Scams
Search
Yourself Online
2018
Articles
Yes, You
Are a Target
Am I
Hacked?
Do's and
Don'ts of Email
CEO
Fraud
Smart
Home Devices
Phone Call
Attacks and Scams
Stop That
Malware
GDPR
(European Privacy Rules)
SANS
Facebook Options
Stop That
Phish
Top Tips to
Securely Using Social Media
Securing
Your Mobile Devices
Creating a Cybersecure
Home
2017
Articles
Lock Down Your Login
Shopping Online
Securely
SANS
Recommendations after the Equifax Hack
Helping Others
Secure Themselves
Password Managers
Backups and Recovery
Gamining Online
Safely & Securely
Lessons from
WannaCry
Securing Today's
Online Kids
Passphrases
Securely Using
Mobile Apps
Staying Secure on
the Road
Social Engineering
2016
Articles
Disposing Your
Mobile Device Securely
Using the Cloud
Securely
Four Steps to
Staying Secure
Email Do's and
Don'ts
Ransomware
CEO Fraud
Encryption
Internet of Things
(IoT)
I'm Hacked, Now
What?
What is Malware?
Securing Your Home
Network
Securing Your New
Tablet
2015
Articles
Phishing
Shopping Online
Securely
Password
Managers
Two-Step
Verification
Backup &
Recovery
Social Media
Educating Kids
on Cyber Safety
Securing the
Cyber Generation Gap
Passphrases
Gaming Online
Safely & Securely
Staying Secure
on the Road
Securely Using
Mobile Apps
2014
Articles
Securing Your
Home Network
What Is
Malware
The End of
Windows XP
Yes, You
Actually Are A Target
Heartbleed
- Why Do I Care?
i'm Hacked,
Now What?
Disposing of
Your Mobile Device
Email Do's and
Don'ts
Encryption
Using the
Cloud Securely
Five Steps to
Staying Secure
Social
Engineering
What is
Anti-Virus?
2013
Articles
Java
Email
Phishing Attacks
Social
Networking Safely
Protecting
Your Kids Online
Passwords
URL
Shorteners and QR Codes
Spear
Phishing
Two-Step
Verification
Personal
Backup and Recovery
Password
Managers
How to Shop
Online Securely
Securing
Your New Tablet
2012
Articles
Secure
your Wi-Fi Network
Securing
Your Mobile Device Apps
E-mail Dos
and Don'ts
Metadata
Safely
Disposing of Your Mobile Device
Using the
Cloud Safely
The
Tech-Support Phone Call Scam
Counterfeit
Websites
Hacked:Now
What?
Losing
Your Mobile Device
Two-Factor
Authentication
Seven
Steps to a Secure Computer
2011
Articles
Email
Phishing and Scan
Browser
Security and Privacy
Backup
and Recovery
Social
Networking Safety
Updating
Your Software
Understanding
Encryption
Protecting
Your Kids Online
Protecting
Your Passwords
Staying
Secure Online While Traveling
Understanding
Anti-Virus Software
Using
Your Smartphone Securely!
Computer File Hashes
SHA2-512
computer file hashes for SANS OUCH
documents
SHA3-256
computer file hashes for SANS OUCH
documents
SHA3-512
computer file hashes for SANS OUCH
documents
Send e-mail to Mr.
Preuss
Originally
Created: December 16, 2011
Modified: March 1, 2026
Contact Webmaster