This site requires JavaScript to be enabled
IE BUMPER
IE BUMPER

IE BUMPER
 
 
 
 
 
 
 
IE BUMPER
IE BUMPER
IE BUMPER
IE BUMPER

Knowledge

1 - 10 of 23
← Previous 1 2 3 Next →
  • Review Links Before Clicking
      Attackers often conceal links in webpages or emails so they appear legitimate.  To see where a link is really going take you, hover your mouse over the link for a few seconds until you see the true URL of link.  Links will either show up in a pop up, or in the lower left hand corner of the screen. The following is an...
  • Enrolling in DUO Two Factor Authentication (2FA)
    Before you can use two factor authentication (2FA), you need to enroll your phone or tablet.  You will also need to download the free Duo mobile app from your phone's app store.  You can use an iOS, Android or Windows phone, or you can use an iOS or Android Tablet.  Once you start the enrollment processes, it is important to continu...
  • Phone Scams / Social Engineering
      Overview A Social Engineering Attack is when an attacker manipulates a person into performing actions, installing malicious software, or divulging confidential information.  This can be done over Email (phishing), text, phone, or in person.  The following are examples of common Social Engineering Attacks.   ...
  • Mobile Security Tips
      Mobile devices often contain sensitive personal data, which make them a target for attackers.  The following tips can help keep your data secure.    Physical Security Avoid leaving your mobile devices in your car, especially in plain sight. Don’t leave your mobile devices unattended in publi...
  • Using DUO Two Factor Authentication (2FA)
      Logging into an application protected by DUO Two-Factor Authentication   DUO 2FA adds an additional step to the login process.  You will enter your username and password as normal, but after you click submit you will be presented with an additional step to confirm your identity.  If you check the "Remember be for 3...
  • Example Phishing Attacks
      There are countless ways attackers can craft emails to try to convince you to open files or click links and divulge information.  The following are examples of phishing emails similar to real phishing attacks we’ve seen.  We have added notes in red to help you identify each email as a scam.   Phishing exam...
  • Application Download Best Practices
      Overview Applications downloaded from the internet may contain malicious programs (viruses, adware, ransomware etc.) that can cause damage or performance issues to your computer, or steal your information.  The following safety tips can help minimize the chance of installing malicious programs.   Download Bes...
  • Removing A Device From DUO
    If a device you enrolled in DUO is no longer in use, you will want to remove it from DUO.  If you had multiple devices in DUO, the following instructions will help you remove a device.   If it is your only device, follow the instruction found at http://duo.slcc.edu/add_device  to add your new device before removing your old device....
  • How to clean computer of possible virus/spyware
    Symptoms Computer is displaying virus alerts and/or spyware notifications. These are pop-up advertisements or virus trouble alerts. Cause Sites accessed on Web Web downloads Opening e-mails with attachments that have a virus Resolution Run the System Center Endpoint Protection antivirus software. ...
  • Using DUO 2FA with a hardware token
    Duo two-factor authentication adds an additional step to the login process.  You will enter your username and password like normal, but after you click submit, you will be presented with an additional step to confirm your identity.  If you click the "Remember me for 3 days" checkbox, you will only have to go through this additional login...
IE BUMPER
IE BUMPER

Topics