Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt [dot] edu
Walk-In: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results

Your Digital Life at HSU

... commercial products . Recognizing and avoiding phishing attacks is also key to keeping your personal data safe. Most are ...

ITS Story - pmb22 - Jul 1 2015 - 12:16pm - 0 comments - 0 attachments

Your Digital Life at HSU

... commercial products . Recognizing and avoiding phishing attacks is also key to keeping your personal data safe. Most are ...

Page - pmb22 - Jun 11 2015 - 1:15pm - 0 comments - 0 attachments

Information Security: Top 10 Security Measures

... 5. Be wary of suspicious e-mails Don't become a phishing victim. Learn how to recognize the signs of a hidden attack . ...

Page - Anonymous - Jun 10 2015 - 12:57pm - 0 comments - 0 attachments

Security :: For Students

... That way, you control the flow of information. Phishing is a widespread tactic used by identity thieves; you owe it to ... . Password protection In addition to resisting phishing and social engineering lures, one of the best ways to secure yourself ...

Page - bjt7001 - Jun 1 2015 - 1:26pm - 0 comments - 0 attachments

Security :: Phishing Examples

Here are a few examples of phishing emails we have received at Humboldt State University. What would ...

Page - rrw1 - May 6 2015 - 3:07pm - 0 comments - 0 attachments

Security :: Breaches of Information Security

... of choice for information thieves, because they enable phishing attacks that may cause people to reveal confidential information. ...

Page - Anonymous - May 6 2015 - 3:05pm - 0 comments - 0 attachments

Security :: Network Access Control

... to be used for the distribution of viruses, spam, phishing attacks, and other security threats. This can sometimes result in ...

Page - rrw1 - Apr 2 2015 - 3:14pm - 0 comments - 0 attachments

Security :: Information Security Office

... services also have an impact on how we combat phishing attacks. When a known compromised account logs in to the HSU ... IP address and lock those accounts. The criminals behind phishing scams are starting to use anonymizing proxy services, and so ...

Page - Anonymous - Feb 10 2015 - 8:34am - 0 comments - 0 attachments

Email

... pages: Attachment filtering Avoiding phishing attacks Avoiding spam Virus protection Other ...

ITS Service - Anonymous - Aug 25 2014 - 1:55pm - 0 comments

Moodle (Mis)communication

... Moodle server and is not spam, malware , phishing , or any other nefarious communication. Moodle staff have ...

ITS Email - pmb22 - Jul 10 2014 - 12:06pm - 0 comments

feedback