Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Security :: Multifunction Copier/Printer Devices

... by hackers, launch a denial-of-service attack, install malware , or gain unauthorized access to the data on the MFD.  When ...

Page - Anonymous - Jul 22 2015 - 2:27pm - 0 comments - 0 attachments

Information Security Organization

... maintaining a high degree of protection against  malware , hackers, and data breaches.   Individual ...

Page - Anonymous - Jul 22 2015 - 1:55pm - 0 comments - 0 attachments

Protecting Yourself and Others

... protect your computer against viruses and other  malware . It's installed automatically on all HSU-owned computers, and is ...

Page - Anonymous - Jul 22 2015 - 1:54pm - 0 comments - 0 attachments

Threat Information

... the links below: Threat landscape : Malware , viruses and bots can come from any direction. Staying on top of ... everyone in the world to not respond. Viruses and malware : Malware includes viruses, worms, trojan horses, spyware, adware, ...

Page - Anonymous - Jul 22 2015 - 1:53pm - 0 comments - 0 attachments

Security:: Multifunction Devices Configuration and Security

... leaves the device vulnerable to hacking, viruses and malware attacks. Request that BIOS updates are maintained by your ...

Page - Anonymous - Jun 10 2015 - 1:10pm - 0 comments - 0 attachments

Security :: Approved Antivirus Software

... spyware, worms, Trojans, and a long list of other malware that can damage data or steal your identity. In order to protect ...

Page - rrw1 - Apr 28 2015 - 10:02am - 0 comments - 0 attachments

Security :: Network Access Control

... way to protect the network is to proactively prevent malware or hackers from gaining access. At HSU, this is tackled at two ...

Page - rrw1 - Apr 2 2015 - 3:14pm - 0 comments - 0 attachments

Security :: Viruses and Other Malware

Malware , short for malicious software , is an all-ecompassing term for ... (or smartphone) without the user's informed consent. Malware includes viruses, worms, trojan horses, spyware, adware, scareware, ... Twenty years ago, worms and viruses were the only forms of malware in circulation, and they were not subtle. You knew you were in trouble ...

Page - rrw1 - Apr 2 2015 - 3:12pm - 0 comments - 0 attachments

Security :: Email Attachments

... should be constantly on guard against the threat of malware and take personal responsibility for ensuring that individual ... in those file formats most commonly used to distribute malware. Gmail will block these types of files even if they are sent in a ...

Page - rrw1 - Apr 2 2015 - 3:11pm - 0 comments - 0 attachments

Security :: HSU-Owned Devices :: Approved Antivirus Software

... spyware, worms, Trojans, and a long list of other malware that can damage or destroy data. In order to protect both your ...

Page - bjt7001 - Apr 2 2015 - 3:10pm - 0 comments - 0 attachments

feedback