Computer Security

Protect Yourself and Your Devices 

When you registered your computer/laptop/pad/tablet/phone in BlueZone to connect to the USU network, you gained access to the abundance of information and services on the internet.  You have also exposed your computer to the mischief and hazards that abound on the internet.  You are your own first line of defense against those ills. You should follow the 8 Steps to Protect Your Computer provided by the IT ServiceDesk and learn here how to be an Internet Skeptic. When your defensive efforts fail, the IT Security Team may be your second line of defense.

Preview our new Security Training Module (hosted at Qualtrics.com).

Contact

Phone: 797-1804

Email:
security@usu.edu

Location: SER 301 view map

Internet Skeptic Blog

Stay informed on how to keep your computer, devices, and cyber identity secure.

Top Ten Scams from the FTC

Top Ten Scams from the FTC

The Federal Trade Commission just posted the Top Ten email and phone scams. They include "Fake IRS, Prize Patrol, Computer Support, Malware alert, Fake FBI, Ransomware, unexpected Government Grant, Medicare account problem, Deportation threat, spoofed Caller ID."

SSN Leak Prompts Safety Reminders

SSN Leak Prompts Safety Reminders

The recent unintended sharing of some SSNs at USU is a reminder that we all need to know what Private Sensitive Information (PSI) we have and use on the job, and how best to protect it.

Computer Security Threats

Do you allow Macros in Word and Excel?

Do you allow Macros in Word and Excel?

If you get email containing an unexpected docx or xlsx attachment, the attachment might contain a malicious macro. Don't let the macro run on your computer!