Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

SANS Security Tip of the Day

Syndicate content SANS Institute Security Awareness Tip of the Day
Security Awareness Tip of The Day
Updated: 3 hours 42 min ago

Major News Events

3 hours 42 min ago
When a major news event happens, cyber criminals will take advantage of the incident and send phishing emails with a subject line related to the event. These phishing emails often include a link to malicious websites, an infected attachment or are a scam designed to trick you out of your money.

Email Auto-Complete

3 hours 42 min ago
Be careful with email auto-complete. This is an email feature that automatically completes a name for you when you begin typing it in the TO field. However, your email client can easily complete the wrong name for you. If you are emailing anything sensitive, always be sure to check the TO field a second time before hitting the send button.

Two Home Computers

3 hours 42 min ago
If possible, have two computers at home -- one for parents and one for kids. If you are sharing a computer, make sure you have separate accounts for everyone and that kids do not have privileged access.

Trust Your Instincts

3 hours 42 min ago
Ultimately, common sense is your best protection. If an email, phone call or online message seems odd, suspicious or too good to be true, it may be an attack.

Never Share Your Passwords

3 hours 42 min ago
Never share your passwords with others, including your supervisor or coworkers. Your password is a secret; it only works if only you know it. If anyone else knows your password, you may be responsible for their actions.

Mobile Apps

August 3, 2015 - 5:29pm
Only install mobile apps from trusted places, and always double-check the privacy settings to ensure you are not giving away too much information.

Lock Your Mobile Devices

August 2, 2015 - 5:23pm
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

Don't Lose That Device

July 29, 2015 - 4:33pm
Did you know that according to the Verizon DBIR team, you are 16 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling, always double-check to make sure you have your mobile device with you, such as when you finish going through airport security, leave your taxi or check out of your hotel.

Protecting Your Social Media Account

July 28, 2015 - 4:20pm
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.

Back up Your Files

July 27, 2015 - 4:03pm
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Cloud Security

July 26, 2015 - 3:58pm
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Protecting Your Social Media Account

July 24, 2015 - 9:26am
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.

Back up Your Files

July 24, 2015 - 9:26am
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Cloud Security

July 24, 2015 - 9:26am
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Don't Lose That Device

July 24, 2015 - 9:26am
Did you know that according to the Verizon DBIR team, you are 16 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling, always double-check to make sure you have your mobile device with you, such as when you finish going through airport security, leave your taxi or check out of your hotel.

Never Give Your Password Over the Phone

July 24, 2015 - 9:26am
Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account.

Kids and Screenshots

July 23, 2015 - 3:22pm
If you have kids with mobile devices, create a central home charging station in a place like your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.

Use Caution Opening Email Attachments

July 22, 2015 - 3:09pm
A common method cyber criminals use to hack into people�s computers is to send them emails with infected attachments. People are tricked into opening these attachments because they appear to come from someone or something they know and trust. Only open email attachments that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Securely Deleting Files

July 21, 2015 - 3:02pm
When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.

Forwarding Emails

July 20, 2015 - 2:49pm
When you forward an email to others or copy new people to an email thread, review all the content in the entire email and make sure the information contained in it is suitable for everyone. It is very easy to forward emails to others, not realizing there is highly sensitive information in the bottom of the email that people should not have access to.
feedback