Workstations in the workplace are sometimes easy targets for criminal activity. Whenever a laptop or mobile device is lost or stolen, the data on that device has also been stolen and if proprietary EKU data is lost or compromised, the resulting damage can be much greater than the cost of replacing the equipment. Some tips:
Like most people, you've probably accumulated a lot of personal information on your mobile device. The valuable data makes these devices a target for thieves and cybercriminals. These tips are especially important if university data is on the mobile device:
You will authenticate your G Suite account like you do your Office 365 account, with your full EKU email address and password:
Open www.google.com and be sure you are logged out of any other Google accounts by clicking the icon in the top-right corner and choosing the Sign out button. If you do not have that, you are not currently logged into a consumer Google or G Suite for Education account.
ISSUE: A recent software update for Microsoft Office on Mac computers can prevent Outlook from working properly. If your Mac is running macOS High Sierra and you install update 16.12 for Outlook 2016, then Outlook will repeatedly (every 30 seconds or so) prompt for your email password.
Criminals use malicious email and websites to try to trick you into revealing your password or other sensitive information or to infect your computer with malware. Phishing emails often use urgent language, asks for personal information, and has grammatical, typographical, or other obvious errors.
Learn to Spot Phishes
Quick Tip: Check Links Before Clicking
Check the full URL to see if it goes where you expect.
Phishing is when a hacker tricks you into handing over your personal information like credit card numbers, usernames and passwords, social security numbers, etc. Commonly they use “spoofed” emails, fraudulent websites, phone service calls, or phony text messages to full you. Phishing is a type of
Issue: Certain non-browser apps don't support two-factor authentication. This lack of support means that if you're using two-factor authentication, the app won't work. To get around this problem, you can create an auto-generated password to use with each non-browser app, separate from your normal password.
If your password is at risk, you may need to change it more often. Ask yourself the questions below to see if you need to change your password now. Balance your answers with the need to have a password that you can remember without having to write it down. If you have a strong, secure password that is easy for you to remember and you can use it with care, you may not need to change it as often as someone whose password is more vulnerable.
EKU encourages all students, faculty, and staff to engage in safe and legally compliant sharing of copyrighted materials. Downloading or sharing copyrighted materials (such as music and videos) can be illegal if done without the permission of the copyright owner whether you profit from it or not.