Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 120 • Hours
Reset HSU Password
System Status

Services For

SANS Security Tip of the Day

Syndicate content SANS Institute Security Awareness Tip of the Day
Security Awareness Tip of The Day
Updated: 3 hours 32 min ago

Don't Lose That Device

November 24, 2015 - 9:00pm
Did you know that according to the Verizon DBIR team, you are 16 times more likely to lose a laptop or mobile devices than have it stolen? When you are traveling, always double-check to make sure you have your mobile device with you, such as when you finish going through airport security, leave your taxi or check out of your hotel.


November 23, 2015 - 9:00pm
Every plugin or add-on you install in your browser can expose you to more danger. Only install the plugins you need and make sure they are always current. If you no longer need a plugin, disable or remove it from your browser via your browser's plugin preferences.

Mobile Apps

November 22, 2015 - 9:00pm
Only install mobile apps from trusted places, and always double-check the privacy settings to ensure you are not giving away too much information.

Never Give Your Password Over the Phone

November 19, 2015 - 9:00pm
Never give your password to someone over the phone. If someone calls you and asks for your password while saying they are from the Help Desk or Tech Support team, it is an attacker attempting to gain access to your account.

Lock Your Mobile Devices

November 18, 2015 - 9:00pm
The number one step for protecting your mobile device is making sure it has a strong passcode or password lock on it so only you can access it.

Forwarding Emails

November 17, 2015 - 9:00pm
When you forward an email to others or copy new people to an email thread, review all the content in the entire email and make sure the information contained in it is suitable for everyone. It is very easy to forward emails to others, not realizing there is highly sensitive information in the bottom of the email that people should not have access to.

Don't Trust Links Sent in Email Messages

November 16, 2015 - 9:00pm
A common method cyber criminals use to hack into people's computers is to send them emails with malicious links. People are tricked into opening these links because they appear to come from someone or something they know and trust. If you click on a link, you may be taken to a site that attempts to harvest your information or tries to hack into your computer. Only click on links that you were expecting. Not sure about an email? Call the person to confirm they sent it.

Unique Passwords

November 12, 2015 - 9:00pm
Make sure each of your accounts has a separate, unique password. Can't remember all of your passwords/passphrases? Consider using a password manager to securely store all of them for you.

Two-Step Verification

November 10, 2015 - 9:00pm
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.

Kids and Screenshots

November 9, 2015 - 9:00pm
If you have kids with mobile devices, create a central home charging station in a place like your bedroom. Before the kids go to bed at night, have them put their mobile devices there so they are not tempted to play with them when they should be sleeping.

Detecting Fraud

November 8, 2015 - 9:00pm
Review your bank, credit card and financial statements regularly to identify unauthorized activity. This is one of the most effective ways to quickly detect if your bank account, credit card or identity has been compromised.

Browse With Encryption

November 5, 2015 - 9:00pm
When browsing online, encrypting your online activities is one of the best ways to protect yourself. Make sure your online connection is encrypted by making sure HTTPS is in the website address and that there is a green lock next to it.

Security Technology Cannot Stop All Attacks

November 4, 2015 - 9:00pm
Technology alone cannot protect you. Bad guys are constantly developing new ways to get past firewalls, anti-virus and filters. You are the best defense against any attacker.

Back up Your Files

November 2, 2015 - 9:00pm
Eventually, we all have an accident or get hacked. And when we do, backups are often the only way to recover. Backups are cheap and easy; make sure you are backing up all of your personal information (such as family photos) on a regular basis.

Social Media Postings

October 29, 2015 - 9:00pm
Be careful: the more information you post online about yourself, the easier it is for a cyber attacker to target you and create custom attacks against you or your organization.

Secure Your Home Wi-Fi Network

October 27, 2015 - 9:00pm
Be aware of all the devices connected to your home network, including baby monitors, gaming consoles, TVs, appliances or even your car. Ensure all those devices are protected by a strong password and/or are running the latest version of their operating system.


October 22, 2015 - 9:00pm
Make sure you have anti-virus software installed on your computer and that it is automatically updating. However, keep in mind that no anti-virus can catch all malware; your computer can still be infected. That is why it's so important you use common sense and be wary of any messages that seem odd or suspicious.

Securely Deleting Files

October 21, 2015 - 9:00pm
When you delete a file, that file is actually still on your computer. The only way you can truly and securely remove a file is by wiping it or using some type of secure deletion.

Cloud Security

October 11, 2015 - 9:00pm
One of the most effective steps you can take to protect your cloud account is to make sure you are using two-step verification. In addition, always be sure you know exactly whom you are sharing files with. It is very easy to accidently share your files with the entire Internet when you think you are only sharing them with specific individuals.

Two-Step Verification

September 9, 2015 - 5:19am
Two-step verification is one of the best steps you can take to secure any account. Two-step verification is when you require both a password and code sent to or generated by your mobile device. Examples of services that support two-step verification include Gmail, Dropbox and Twitter.