Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 101 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Security :: Information Security Online Training

... the CFA and CSUEU. Protecting yourself against malware and other threats Keeping your email and mobile devices secure ...

Page - rrw1 - Jul 22 2015 - 4:31pm - 0 comments - 0 attachments

Security :: Virus Protection

... your screen, or applications stopped working. Today's malware instead tries to be as secretive as possible - the goal is to get ... Because certain file types are commonly used to transmit malware, those types of file may not be sent over the HSU email system as an ...

Page - rrw1 - Jul 22 2015 - 3:35pm - 0 comments - 0 attachments

Security :: Compromised Host Procedure - For IT Support Staff Use Only

... identified as being infected by a virus or other malware , proceed to the next step. If you run all the listed tools and ... Tools Sophos Root Kit Detector Malware Bytes F-Secure Blacklight GMER SysInternals ...

Page - rrw1 - Jul 22 2015 - 3:32pm - 0 comments - 0 attachments

Security :: Multifunction Copier/Printer Devices

... by hackers, launch a denial-of-service attack, install malware , or gain unauthorized access to the data on the MFD.  When ...

Page - Anonymous - Jul 22 2015 - 3:27pm - 0 comments - 0 attachments

Information Security Organization

... maintaining a high degree of protection against  malware , hackers, and data breaches.   Individual ...

Page - Anonymous - Jul 22 2015 - 2:55pm - 0 comments - 0 attachments

Protecting Yourself and Others

... protect your computer against viruses and other  malware . It's installed automatically on all HSU-owned computers, and is ...

Page - Anonymous - Jul 22 2015 - 2:54pm - 0 comments - 0 attachments

Threat Information

... the links below: Threat landscape : Malware , viruses and bots can come from any direction. Staying on top of ... everyone in the world to not respond. Viruses and malware : Malware includes viruses, worms, trojan horses, spyware, adware, ...

Page - Anonymous - Jul 22 2015 - 2:53pm - 0 comments - 0 attachments

Security:: Multifunction Devices Configuration and Security

... leaves the device vulnerable to hacking, viruses and malware attacks. Request that BIOS updates are maintained by your ...

Page - Anonymous - Jun 10 2015 - 2:10pm - 0 comments - 0 attachments

Security :: Network Access Control

... way to protect the network is to proactively prevent malware or hackers from gaining access. At HSU, this is tackled at two ...

Page - rrw1 - Apr 2 2015 - 4:14pm - 0 comments - 0 attachments

Security :: Viruses and Other Malware

Malware , short for malicious software , is an all-ecompassing term for ... (or smartphone) without the user's informed consent. Malware includes viruses, worms, trojan horses, spyware, adware, scareware, ... Twenty years ago, worms and viruses were the only forms of malware in circulation, and they were not subtle. You knew you were in trouble ...

Page - rrw1 - Apr 2 2015 - 4:12pm - 0 comments - 0 attachments

feedback