IT Students Share Strategies for Staying Safe Online
Published 02.26.2015
News
Information Technology
Student News
Industrial, Computing & Engineering Technologies News
![William C. Blessing talks about the malicious methods employed to compromise computer security.](http://www.pct.edu/files/news/images/2015/02/Data4-150x150.jpg)
![Zachary L. Lundberg addresses the benefits (and more than occasional pitfalls) of geolocation, which pinpoints and shares one's physical whereabouts.](http://www.pct.edu/files/news/images/2015/02/Data1-150x150.jpg)
![Several "cloud"-based systems for information backup are assessed by Adam T. Check.](http://www.pct.edu/files/news/images/2015/02/Data2-150x150.jpg)
![David M. Mossop (left) and Jeremy W. Rennicks cover multiple security considerations, including password strength, wireless security and the endless shelf life of Internet posts.](http://www.pct.edu/files/news/images/2015/02/Data3-150x150.jpg)