This site requires JavaScript to be enabled
IE BUMPER
IE BUMPER

IE BUMPER
 
 
 
 
 
 
 
IE BUMPER
IE BUMPER
IE BUMPER
IE BUMPER

Knowledge

1 - 10 of 12
← Previous 1 2 Next →
  • Review Links Before Clicking
      Attackers often conceal links in webpages or emails so they appear legitimate.  To see where a link is really going take you, hover your mouse over the link for a few seconds until you see the true URL of link.  Links will either show up in a pop up, or in the lower left hand corner of the screen. The following is an...
  • Phone Scams / Social Engineering
      Overview A Social Engineering Attack is when an attacker manipulates a person into performing actions, installing malicious software, or divulging confidential information.  This can be done over Email (phishing), text, phone, or in person.  The following are examples of common Social Engineering Attacks.   ...
  • Mobile Security Tips
      Mobile devices often contain sensitive personal data, which make them a target for attackers.  The following tips can help keep your data secure.    Physical Security Avoid leaving your mobile devices in your car, especially in plain sight. Don’t leave your mobile devices unattended in publi...
  • Example Phishing Attacks
      There are countless ways attackers can craft emails to try to convince you to open files or click links and divulge information.  The following are examples of phishing emails similar to real phishing attacks we’ve seen.  We have added notes in red to help you identify each email as a scam.   Phishing exam...
  • Security Training and Awareness
    Training & Awareness OIT Brown Bag Training Downloads See attached   New Employee IT Training All new employees are strongly encouraged to attend as close to their first day of work as possible. Presented By:  John Hunt, SLCC OIT Trainer. Featured Topics : New Employee Online Orientation, Telephone Usage,...
  • Personally Identifiable Information
    Personally Identifiable Information   Personally Identifiable Information(PII):   is information that can be used to uniquely identify, contact, or locate a single person or can be used with other sources to uniquely identify a single individual. Examples: Social Security Numbers Credit Card Numbers Dri...
  • Phishing Related Links
    The best defense against phishing is being able to quickly recognize them.  The following links will help you learn more about different phishing techniques, and what you can do if you do fall victim to a phishing attack, and other ways you can keep yourself safe online.  Please note these links are provided for your information. ...
  • Phishing Email Scams
      What is Phishing?     A phishing attacks is a way of attempting to get a user to install malicious software or have the user provide sensitive information such as usernames, passwords and credit card details by masquerading as a trustworthy entity in an electronic communication.     What are Phi...
  • Security Tips
    Password Use Use long passwords that are difficult to guess. Passphrases provide stronger protection than passwords. Include uppercase, lowercase, numbers and symbols where permitted. Do not use the same password for multiple accounts.  Avoid keyboard patterns, dictionary words, letter or number sequences or userna...
  • Security Policies and Guidelines
    Security Policies and Guidelines Acceptable Use of College Computing Resources Student Code of Conduct Copyright Laws as they apply to Higher Education Intellectual Property Rights of Employees or Contractors of SLCC Records Management USHE Information Technology Resource Security (R345)
IE BUMPER
IE BUMPER

Topics