Get Help

Online: Request Help
Phone: (707) 826-4357 • Hours
Email: help@humboldt.edu
Walk-In: Library 101 • Hours
Reset HSU Password
System Status

Search

Search results

  1. ITS Benchmarks

    ... Reduce number of overdue sessions/ repeat victims of phishing attacks Incident types over time   ...

    Page - blg10 - Aug 29 2016 - 15:10

  2. Information Security: Top 10 Security Measures

    ... 5. Be wary of suspicious e-mails Don't become a phishing victim. Learn how to recognize the signs of a hidden attack . ...

    Page - Anonymous - Aug 29 2016 - 14:37

  3. Don't be a victim of identity theft!

    ... how to avoid email scammers .   Phishing and spam emails continue to appear in campus email. Please don't ... emails.  Make use of the Gmail and Outlook spam and phishing reporting tools and forward suspicious email to  help@humboldt.edu ...

    ITS Story - Anonymous - Aug 25 2016 - 15:31

  4. Security :: For Students

    ... request. That way, you control the flow of information. Phishing is a widespread tactic used by identity thieves; you owe it to ... here . Password protection In addition to resisting phishing and social engineering lures, one of the best ways to secure yourself ...

    Page - bjt7001 - Aug 25 2016 - 15:11

  5. Security :: Network Access Control

    ... known to be used for the distribution of viruses, spam, phishing attacks, and other security threats. This can sometimes result in ...

    Page - rrw1 - Aug 25 2016 - 15:08

  6. Security :: Information Security Office

    ... too good to be true, it usually is.   Reporting Phishing Emails to the Information Security Office You may have noticed a ... the email or by filling out an online form, this is called phishing - and here's a recent example: A couple of weeks ago, a few ...

    Page - Anonymous - Aug 25 2016 - 15:04

  7. Don't Get Hooked by a Phish!

    ... take five minutes to read this.    What Is Phishing? Phishing is a kind of social engineering used by hackers and other criminals in ...

    Page - pmb22 - Aug 25 2016 - 14:56

  8. I worry about email scams

    ... the signs of a hidden attack and avoid becoming a phishing victim. Never click on a link in an email; if you're tempted, cut and ...

    FAQ - Anonymous - Aug 11 2016 - 10:48

  9. Your Digital Life at HSU

    ... and commercial products . Recognizing and avoiding phishing attacks is also key to keeping your personal data safe. Most are ...

    Page - pmb22 - Aug 3 2016 - 13:53

  10. Security :: Spam and Phishing Scams

    Phishing scams are attempts by hackers and cybercriminals to steal personal ... nefarious purposes. The most common (and most successful) phishing scams are emails that appear to come from a legitimate source (for ... . What You Can Do To avoid becoming a victim of a phishing scam, just stop and think any time you find yourself tempted to click ...

    Page - rrw1 - Jul 10 2016 - 19:09

Pages