Protect Yourself and Your Devices
When you registered your computer/laptop/pad/tablet/phone in BlueZone to connect to the USU network, you gained access to the abundance of information and services on the internet. You have also exposed your computer to the mischief and hazards that abound on the internet. You are your own first line of defense against those ills. You should follow the 8 Steps to Protect Your Computer provided by the IT ServiceDesk and learn here how to be an Internet Skeptic. When your defensive efforts fail, the IT Security Team may be your second line of defense.
Preview our new Security Training Module (hosted at Qualtrics.com).
Stay informed on how to keep your computer, devices, and cyber identity secure.
Adobe lost control of data about 38 million users, including their username and password to access the Adobe site. About 3400 USU users were included. Two issues are important for us: 1) Did anyone at USU use the same password for Adobe and for their A-Number? 2) will we all see more spam because anyone can now get all those email addresses?
With a combination of reports by Internet Skeptics at USU and filtering rules in the USU email system, we identify numerous phish episodes ("attacks") every day. Most of them consist of just a few copies of the phish message, but occasionally a heavy spam event hits USU.