Issue: Certain non-browser apps don't support two-factor authentication. This lack of support means that if you're using two-factor authentication, the app won't work. To get around this problem, you can create an auto-generated password to use with each non-browser app, separate from your normal password.
Use secure networks, such as your cellular carrier network, EKU_SECURE, or a wire connection.
Use a wired connection when practical. Wired connections to the internet from on-campus computers, including lab computers, use the university's secure network. These are always recommended on-campus for Blackboard (e.g., taking tests and quizzes) and confidential university work (e.g., financial information).
Leaving EKU? Whether you're about to graduate, retire, or take another job, take these steps to make your transition as smooth as possible.
Effective Wednesday, October 1, 2018, EKU IT--to remain in legal compliance with both Microsoft, Google, and our software vendors-- must remove access to Office 365, Google app services, and university licensed software as listed below.
Many email clients will likely configure the necessary settings if you provide your myMail address and password. In case they don’t:
POP setting (the first method of downloading mail; clients usually give you the option of keeping or removing a copy of messages stored on myMail site )
Server name: outlook.office365.com
Encryption method: TLS
If your password is at risk, you may need to change it more often. Ask yourself the questions below to see if you need to change your password now. Balance your answers with the need to have a password that you can remember without having to write it down. If you have a strong, secure password that is easy for you to remember and you can use it with care, you may not need to change it as often as someone whose password is more vulnerable.
Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware. Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors.
Learn to Spot Phishes
Quick Tip: Check Links Before Clicking
Check the full URL to see if it goes where you expect.