Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 120 • Hours
Reset HSU Password
System Status

Services For

SANS Security Tip of the Day

Syndicate content SANS Institute Security Awareness Tip of the Day
Security Awareness Tip of The Day
Updated: 1 hour 12 min ago


October 12, 2015 - 10:00pm
Phishing is when an attacker attempts to fool you into clicking on a malicious link or opening an attachment in an email. Be suspicious of any email or online message that creates a sense of urgency, has bad spelling or addresses you as "Dear Customer."

Cloud Security

October 11, 2015 - 10:00pm
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Don't Login on Untrusted Computers

October 8, 2015 - 10:00pm
A password is only as secure as the computer or network it is used on. As such, never log in to a sensitive account from a public computer, such as computers in a cyber cafe, hotel lobby or conference hall. Bad guys target public computers such as these and infect them on purpose. The moment you type your password on an infected computer, these cyber criminals can harvest your passwords. If you have no choice but to use a public computer, change your password at the next available opportunity you have access to a trusted computer.

Email and Emotions

October 7, 2015 - 10:00pm
Never send an email when you are angry; you will most likely regret it later. Instead, when you are emotional and want to reply to someone, open up an email and write everything you feel, but do not send it. (Be sure there is no name in the TO field so that you do not accidently send it.) After you have vented, save the email and come back an hour later. You only want to reply to any type of emotional situation after you have had time to cool down.

Detecting Fraud

October 5, 2015 - 10:00pm
Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised.

Never Give Your Password Over the Phone

October 1, 2015 - 10:00pm
Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account.


September 29, 2015 - 10:00pm
Make sure you have anti-virus software installed on your computer and that it is automatically updating. However, keep in mind that no anti-virus can catch all malware; your computer can still be infected. That is why it's so important you use common sense and be wary of any messages that seem odd or suspicious.

Kids and Mobile Devices

September 28, 2015 - 10:00pm
If you have kids with mobile devices, create a central home charging station in your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.

You Are a Target

September 27, 2015 - 10:00pm
You may not realize it, but you are a target. Your computer, your work and personal accounts and your information are all highly valuable to cyber criminals. Be mindful that bad guys are out to get you.

Secure Your Home Wi-Fi Network

September 22, 2015 - 10:00pm
Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their operating system.

Securely Deleting Files

September 21, 2015 - 2:17pm
When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.

Protecting Your Social Media Account

September 20, 2015 - 2:06pm
Bad guys are targeting your social media accounts. One of the most effective ways you can protect them is with a unique, strong password called a passphrase. Enabling two-step verification (if your social media site offers it) is even better.


September 16, 2015 - 1:27pm
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.

Mobile Apps

September 13, 2015 - 1:05pm
Only install mobile apps from trusted places, and always double-check the privacy settings to ensure you are not giving away too much information.

Two-Step Verification

September 10, 2015 - 6:33pm
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

Two-Step Verification

September 9, 2015 - 6:19am
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

Browse With Encryption

September 7, 2015 - 6:10pm
When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it.

Shopping Online

September 6, 2015 - 6:00pm
When shopping online, always use your credit cards instead of a debit card. If any fraud happens, it is far easier to recover your money from a credit card transaction. Gift cards and one-time-use credit card numbers are even more secure.

Lock Your Mobile Devices

September 3, 2015 - 5:23pm
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

Securely Disposing Mobile Devices

August 23, 2015 - 3:26pm
Do you plan on giving away or selling one of your older mobile devices? Make sure you wipe or reset your device before disposing of it. If you don't, the next person who owns it will have access to all of your accounts and personal information.