Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Don't be a victim of identity theft!

Phishing and spam emails continue to appear in campus email. Please don't ...  Make use of the Gmail and Outlook spam and phishing reporting tools and forward suspicious email to  ... (4357). You can also find more information about spam and phishing emails on the ITS website . ...

ITS Story - Anonymous - Sep 5 2014 - 1:30pm - 0 comments - 0 attachments

Security :: Information Security Office

... services also have an impact on how we combat phishing attacks. When a known compromised account logs in to the HSU ... IP address and lock those accounts. The criminals behind phishing scams are starting to use anonymizing proxy services, and so ...

Page - Anonymous - Feb 10 2015 - 9:34am - 0 comments - 0 attachments

Your Digital Life at HSU

... commercial products . Recognizing and avoiding phishing attacks is also key to keeping your personal data safe. Most are ...

Page - pmb22 - Jun 11 2015 - 2:15pm - 0 comments - 0 attachments

Your Digital Life at HSU

... commercial products . Recognizing and avoiding phishing attacks is also key to keeping your personal data safe. Most are ...

ITS Story - pmb22 - Jul 1 2015 - 1:16pm - 0 comments - 0 attachments

Security :: For Students

... That way, you control the flow of information. Phishing is a widespread tactic used by identity thieves; you owe it to ... . Password protection In addition to resisting phishing and social engineering lures, one of the best ways to secure yourself ...

Page - bjt7001 - Jun 1 2015 - 2:26pm - 0 comments - 0 attachments

Moodle (Mis)communication

... Moodle server and is not spam, malware , phishing , or any other nefarious communication. Moodle staff have ...

ITS Email - pmb22 - Jul 10 2014 - 1:06pm - 0 comments

Why is single sign-on important?

... use of network resources thanks to: Reduces phishing success, because you're not automatically entering multiple ...

FAQ - Anonymous - Jul 30 2012 - 4:00pm - 0 comments - 0 attachments

Threat Information

... current on updates will go a long way to help.  Phishing scams : Attempts by hackers and cyberciminals to steal personal ...

Page - Anonymous - Jul 22 2015 - 2:53pm - 0 comments - 0 attachments

Security :: Breaches of Information Security

... of choice for information thieves, because they enable phishing attacks that may cause people to reveal confidential information. ...

Page - Anonymous - May 6 2015 - 4:05pm - 0 comments - 0 attachments

ITS Benchmarks

... Reduce number of overdue sessions/ repeat victims of phishing attacks Incident types over time   ...

Page - blg10 - Jul 27 2015 - 9:11am - 0 comments - 1 attachment

feedback