You are currently viewing Personal Cybersecurity Tips: Hope Thoms on Securing the Digital Frontier at UAT

Personal Cybersecurity Tips: Hope Thoms on Securing the Digital Frontier at UAT

In the ever-evolving cybersecurity landscape, people are increasingly forced to navigate the digital frontier with vigilance and caution. Meet Hope Thoms, a hard-working University of Technology (UAT) student whose insights into personal security practices shed light on the strategies people use to protect their digital identities.

Hope Thoms, an enterprising student at UAT, shares her approach. to cyber security and personal security measures. Hope currently works on cybersecurity projects, but is aware of the importance of digital security in today’s connected world.

Personal Cybersecurity Tips

When asked about security measures, Hope points out that she relies on Google password management and two-factor authentication whenever possible. . “I use Google’s password manager and use two-factor when it’s available,” he reveals. This proactive measure not only improves the security of her accounts, but also underscores the importance of leveraging technology to strengthen digital defenses.

In an age of phone scams and phishing attempts, Hope treats incoming calls with caution. “I usually don’t even answer,” he admits when asked how he deals with phone scams. This simple but effective strategy minimizes the risk of falling victim to fraud schemes and emphasizes the importance of considering communication channels.

When keeping passwords secure, Hope understands the importance of finding a balance between complexity and memorability. “There’s nothing very easy to guess, but nothing crazy either,” he notes. This pragmatic approach underscores the need for people to prioritize password strength while ensuring usability and ease of memory.

In addition, when asked about using password management, Hope says she trusts Google’s platform. By centralizing and securely managing her data with a trusted service provider, she simplifies the process of accessing and protecting her digital accounts.

But despite proactive security measures, Hope is skeptical about the safety of the school environment. “No, Phoenix in general really isn’t,” he notes when asked about the safety of the school’s location. This honest review is a reminder of the broader security issues that individuals face in their physical environment and emphasizes the importance of comprehensive security measures both online and offline.

Finally, Hope Thoms provides valuable insight into the world of cyber security and personal safety. . safety practices based on his experiences as a dedicated student at UAT. By implementing proactive measures such as password management and two-factor authentication, people can strengthen their digital defenses and reduce risks from cyber threats. Hope’s pragmatic approach is a testament to the importance of vigilance and caution in safely navigating the digital environment, empowering people to embrace technology with confidence and flexibility.

Interview Conducted by UAT Student Alexis Sloan, Connect and Learn more LinkedIn STEM for Kiddos https://stemforkiddos.godaddysites.com/ Instagram @stem_for_kiddos

To Learn More:

Revolutionizing Community Safety: Advanced Security Solutions in Phoenix 

Secure Game Development Insights: Daniel Diaz’s Approach to Protecting Digital Creativity


For more information on UAT:

University of Advancing Technology in Tempe, Arizona

Cybersecurity Program

UAT’s cybersecurity degrees are recognized for their excellence, with programs including undergraduate studies in Network Security, Network Engineering, and Technology Forensics, as well as a graduate program in Cyber Security. These programs are designed to propel graduates to the forefront of the industry, equipping them with the skills needed to become ethical hackers and cybersecurity professionals. The undergraduate Network Security degree emphasizes proactive techniques to protect information systems against potential exploitation, covering areas such as penetration testing and the development of exploits for identified vulnerabilities​​​​.

Business & Innovation Programs

UAT offers advanced degrees focusing on the intersection of technology and business, aiming to foster innovation and leadership skills. These include Business Technology, Technology Innovation, Technology Leadership, and Technology Studies, each designed to prepare students for leadership roles in technology-driven environments​​.

  • Business Technology (BS)
  • Technology Innovation (MS)
  • Technology Leadership (MS)
  • Technology Studies (BS)

Creation & Simulation Programs

For those interested in the creative aspects of technology, UAT offers degrees in Digital Maker and Fabrication, Human Computer Interaction, Robotics and Embedded Systems, and Virtual Reality. These programs are geared towards students looking to innovate in digital creation and simulation​​.

  • Digital Maker and Fabrication (BS)
  • Human Computer Interaction (BS)
  • Robotics and Embedded Systems (BS)
  • Virtual Reality (BS)

Alexis Sloan

Hi! My name is Alexis Sloan. I’m originally from Denver, Colorado but currently out in Tempe, Arizona attending The University of Advancing Technology getting a bachelors degree in network security and network engineering and in the future pursuing a masters in technology leadership. I have a project called STEM For Kiddos running, in GeekRho (student council) here on campus, President of Gardening Club, and anything else to keep me busy. From dying my hair to studying to crocheting at the end of the day I am happy to be here and have the opportunity to interview fellow students and bring awareness to others about cybersecurity. I hope you enjoy the insights from others within the blogs.

This Post Has 2 Comments

Comments are closed.