Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Walk-In: Library 101 • Hours
Reset HSU Password
System Status


Security :: Phishing Examples

Here are a few examples of phishing emails we have received at Humboldt State University. What would you have done if you'd received any of these emails? Are there tell-tale signs you would have picked up?


Security :: Spam and Phishing Scams

Phishing scams are attempts by hackers and cybercriminals to steal personal information or hijack computing resources for nefarious purposes.


Security :: Compromised Host Procedure - For IT Support Staff Use Only



HSU has established best practice procedures that must be followed whenever a computer connected to a University network is suspected of having been compromised by a virus or other threat.


Security :: Information Security Online Training

In collaboration with all CSU campuses, the Chancellor’s Office has developed a web-based information security awareness training course designed to provide staff and faculty with the information they need to secure information resources. This course will help Humboldt State University employees safeguard personal information as well as information stored under the aegis of the University.

The awareness training covers the following topics, and has been reviewed by the CFA and CSUEU.


Security :: Security Resources for ITS Support Staff

IT personnel are expected to have a solid understanding of information security issues, both in general and how they apply specifically to the use of computers on the HSU campus. For ease of use, this page brings together a number of security-related resources - you're encouraged to review and become familiar with them.


Security :: Cornell Spider - Linux

Spider is an open source network forensics tool developed at Cornell University to identify the presence of sensitive information on a computer or attached storage device.


Security :: Cornell Spider - Macintosh OS X

Spider is an open source network forensics tool developed at Cornell University to identify the presence of Personally-Identifiable Information (PII) on a computer.


Security :: Cornell Spider - Windows

Spider is an open source network forensics tool developed at Cornell University to identify the presence of Personally Identifiable Information (PII) on a computer.


Security :: Macintosh OS X Disk Encryption Utility

The Disk Utility program in Mac OS X enables you to create disk images (.dmg), similar to those you encounter when you install software on your Mac. When you double-click on this type of file, your computer mounts it as though it were a DVD or hard drive. In fact, you can think of mounted disk images as virtual drives. You can also add password protection to disk images when you create them.


Security :: 7-Zip Windows Encryption

7-Zip is an open source file archiver designed for Microsoft Windows. 7-Zip uses the 7z archive format, and can read and write to other popular archive formats. The program can be used from a command line interface, graphical user interface, or Windows shell integration. 

7-Zip may be used to create encrypted files or folder copies for moving information to a different device - for example copying and moving to an external flash drive, hard drive, or phone. It does not, however, replace the use of BitLocker for storing data on a fixed drive.