Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 101 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Security :: Information Security Incidents

... of choice for information thieves, because they enable phishing attacks that may cause people to reveal confidential information. ...

Page - bjt7001 - Jul 22 2015 - 2:57pm - 0 comments - 0 attachments

Threat Information

... current on updates will go a long way to help.  Phishing scams : Attempts by hackers and cyberciminals to steal personal ...

Page - Anonymous - Jul 22 2015 - 2:53pm - 0 comments - 0 attachments

Security :: Spam and Phishing Scams

Phishing scams are attempts by hackers and cybercriminals to steal personal ... nefarious purposes. The most common (and most successful) phishing scams are emails that appear to come from a legitimate source (for ... . What You Can Do To avoid becoming a victim of a phishing scam, just stop and think any time you find yourself tempted to click ...

Page - rrw1 - Jul 8 2015 - 11:05am - 0 comments - 0 attachments

Your Digital Life at HSU

... commercial products . Recognizing and avoiding phishing attacks is also key to keeping your personal data safe. Most are ...

ITS Story - pmb22 - Jul 1 2015 - 1:16pm - 0 comments - 0 attachments

Information Security: Top 10 Security Measures

... 5. Be wary of suspicious e-mails Don't become a phishing victim. Learn how to recognize the signs of a hidden attack . ...

Page - Anonymous - Jun 10 2015 - 1:57pm - 0 comments - 0 attachments

Security :: For Students

... That way, you control the flow of information. Phishing is a widespread tactic used by identity thieves; you owe it to ... . Password protection In addition to resisting phishing and social engineering lures, one of the best ways to secure yourself ...

Page - bjt7001 - Jun 1 2015 - 2:26pm - 0 comments - 0 attachments

Security :: Phishing Examples

Here are a few examples of phishing emails we have received at Humboldt State University. What would ...

Page - rrw1 - May 6 2015 - 4:07pm - 0 comments - 0 attachments

Security :: Breaches of Information Security

... of choice for information thieves, because they enable phishing attacks that may cause people to reveal confidential information. ...

Page - Anonymous - May 6 2015 - 4:05pm - 0 comments - 0 attachments

Security :: Network Access Control

... to be used for the distribution of viruses, spam, phishing attacks, and other security threats. This can sometimes result in ...

Page - rrw1 - Apr 2 2015 - 4:14pm - 0 comments - 0 attachments

Moodle (Mis)communication

... Moodle server and is not spam, malware , phishing , or any other nefarious communication. Moodle staff have ...

ITS Email - pmb22 - Jul 10 2014 - 1:06pm - 0 comments

feedback