Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Security

Email

Local Service

All students, faculty and staff are provided an email account on the local campus server for the entire time they are associated with HSU. The name of the email server is webmail. Additional email server account information can be found at Central Systems Account & Activation.

Activate Your Account - Instructions for activating your email account.

Email :: Barracuda Setup Instructions

Please note: As of February 22, 2011, incoming mail for the domain humboldt.edu will now go directly to Google's Mail servers, and will bypass our Barracuda Spam filters. Spam filtering/flagging will therefore be handled by Google. You can still access the Barracuda Spam filters (for older mail that got quarantined).

For more detailed information download the Barracuda's End User Manual

Security :: Secure Authentication

Secure authentication is the process by which the HSU computer networks determine that you are who you claim to be and grant you access to those parts of the network you are authorized to access. The process is accomplished through the combination of your unique HSU User Name and Password and your role at the University.

Guides :: Account Activation Checklist

All new faculty, staff, and students must complete the Account Activation Checklist prior to accessing email and other computer accounts.

Policy :: Information Security Policies and Standards

The Humboldt State University Information Security Policy comprises policies, standards, guidelines, and procedures pertaining to information security. The information contained in these documents is largely developed and implemented at the CSU level, although some apply only to HSU or a specific department.

Security :: Viruses and Other Malware

Malware, short for malicious software, is an all-ecompassing term for any software designed to harm or secretly access a computer system (or smartphone) without the user's informed consent. Malware includes viruses, worms, trojan horses, spyware, adware, scareware, rootkits, exploits, and any other piece of software designed to disrupt, destroy or steal valuable information.

Security :: Spammers, Phishers, and How to Stop Them

 

Learn how to recognize spam and phishing emails (yes, they are different), what their goal is, and how you can help keep them out of your - and everyone else's - inboxes. Read on for more about spam and phishing attacks.

Email messages, however authentic they might look, may not be legitimate and may be spam or phishing. What's the difference, and what can you do to keep them out of your inbox?

Security :: Secure Media Transfer & Disposal Procedures

The procedures detailed on this page are intended to prevent the inadvertent release of confidential, protected, or personally-identifiable information contained on electronic storage devices when physical possession or stewardship is changed.

Security :: Personal Responsibility

Freely-available computing, communication, and information resources are so key for everyone at HSU that it is imperative everyone recognizes the need for responsible use. Irresponsible and inappropriate use of computing resources risks not only the security, even the availability, of those resources but also puts individuals and the University at risk of legal action by any party that becomes a victim of the consequences of such behaviors. 

Security :: Procedure for Submitting Staff, Contractor, Consultant, and Student Employee Confidentiality Statements

Every Humboldt State University employee, contractor, student employee, or consultant (other than a faculty member) who has access to personally identifiable information (PII) or confidential data must have a signed Confidentiality Statement on file with Human Resources in order for those individuals to be authorized to access University records. 

 

feedback