Computer Security

Protect Yourself and Your Devices 

When you registered your computer/laptop/pad/tablet/phone in BlueZone to connect to the USU network, you gained access to the abundance of information and services on the internet. You have also exposed your computer to the mischief and hazards that abound on the internet. You are your own first line of defense against those ills. You should follow the 8 Steps to Protect Your Computer provided by the IT Service Desk and learn here how to be an "Internet Skeptic." When your defensive efforts fail, the IT Security Team may be your second line of defense.

Preview our new Security Training Module (hosted at Qualtrics.com).

Contact

Phone: 797-1804

Email:
security@usu.edu

Location: SER 301 view map

Internet Skeptic Blog

Stay informed on how to keep your computer, devices, and cyber identity secure.

"Help! Send Money!" Scam Analyzed

"Help! Send Money!" Scam Analyzed

One use of a hacked/phished email account is to send a request for help to everyone in the addressbook and more. Here's how one of those scams plays out...

Login page for research article is fake

Login page for research article is fake

On March 7 we received about 50 copies of a phish requesting a research article. The link provided went to a copy of the USU login page on a web server in India.

Computer Security Threats

Impersonating Administrators for Fund Transfers

Impersonating Administrators for Fund Transfers

Scammers can find contact info for Administrators and their Business Officers. A Forged email can be constructed requesting the Business Officer to make a fund or wire transfer. Do you know the clues that will reveal the mischief?