Proofpoint URL Defense
SLCC has implemented new technology to protect our Staff and Faculty Members from targeted-attacks emails including phishing to get people to give up their SLCC network credentials. These messages and websites that are linked often look legitimate because they use our own logos and valid address and other contact information.
Review Links Before Clicking
Attackers often conceal links in webpages or emails so they appear legitimate. To see where a link is really going take you, hover your mouse over the link for a few seconds until you see the true URL of link.
Links will either show up in a pop up, or in the lower left hand corner of the screen.
The following is an...
Enrolling in DUO Two Factor Authentication (2FA)
Before you can use two factor authentication (2FA), you need to enroll your phone or tablet. You will also need to download the free Duo mobile app from your phone's app store. You can use an iOS, Android or Windows phone, or you can use an iOS or Android Tablet. Once you start the enrollment processes, it is important to continu...
Phone Scams / Social Engineering
A Social Engineering Attack is when an attacker manipulates a person into performing actions, installing malicious software, or divulging confidential information. This can be done over Email (phishing), text, phone, or in person. The following are examples of common Social Engineering Attacks.
Mobile Security Tips
Mobile devices often contain sensitive personal data, which make them a target for attackers. The following tips can help keep your data secure.
Avoid leaving your mobile devices in your car, especially in plain sight.
Don’t leave your mobile devices unattended in publi...
Using DUO Two Factor Authentication (2FA)
Logging into an application protected by DUO Two-Factor Authentication
DUO 2FA adds an additional step to the login process. You will enter your username and password as normal, but after you click submit you will be presented with an additional step to confirm your identity. If you check the "Remember be for 3...
Example Phishing Attacks
There are countless ways attackers can craft emails to try to convince you to open files or click links and divulge information. The following are examples of phishing emails similar to real phishing attacks we’ve seen. We have added notes in red to help you identify each email as a scam.
Application Download Best Practices
Applications downloaded from the internet may contain malicious programs (viruses, adware, ransomware etc.) that can cause damage or performance issues to your computer, or steal your information. The following safety tips can help minimize the chance of installing malicious programs.
Removing A Device From DUO
If a device you enrolled in DUO is no longer in use, you will want to remove it from DUO. If you had multiple devices in DUO, the following instructions will help you remove a device. If it is your only device, follow the instruction found at http://duo.slcc.edu/add_device to add your new device before removing your old device....
Proofpoint Spam Management System
What is the Proofpoint spam management system and why do we use it? Proofpoint is an anti-spam and email protection process that provides multiple layers of security to protect the SLCC Exchange server from spam, malware and non-malware threats; such as email fraud and phishing. It controls all sus...