Found 15 Results For:
  • Cybersecurity
Clear All Filters
C

Cybersecurity Tips for Traveling

View precautionary measures you can take to lower your risk of being a target while traveling.

F

File-Sharing

Sharing copyrighted P2P files is illegal and can cause major issues.

M

Multifactor Authentication (MFA) and Duo

The use of MFA helps to protect the university from potential hackers, reduces the impact of accounts being compromised by more than 50 percent, secures faculty research and can potentially reduce the need for password updates.

P

Password Best Practices

Your online safety is important, and your password is one of the most important ways to keep yourself safe. Here’s our guide to creating a password to help you keep your information secure.

Patches and Updates

Installing patches and updates will help you to be better defend against cyber threats.

Phishing

Avoid becoming a phishing victim by staying informed and following the tips provided to you by Adelphi University's Office of Information Technology.

R

Ransomware

Stay informed so you can avoid becoming a victim of Ransomware.

Report Phishing

Avoid becoming a phishing victim by staying informed and following the tips provided and knowing what to look for.

S

Saving Your Work

You should save all of your files to either Google Drive, or your Network drives. These files are saved securely and automatically backed up.

Secure Communication

Adelphi's Information Technology's tips for keep your identity safe online. Online shopping, email security, browser settings, windows updates and wireless connections all covered.

Social Media Safety

Don’t expose your activities and personal info on social networking sites.

Spearphishing

Spearphishing is a highly targeted form of phishing, which is an email that is made to appear to come from a friend, colleague or business you are familiar with.

Spyware

Spyware is software that collects your personal information. Learn best practices to prevent threats.

T

Theft and Loss

Don’t leave your belongings unattended. Phones, tablets, and laptops are easy targets of thieves and can also be accidentally lost in public spaces.

V

Viruses

Viruses, worms, and trojans—know what to look for and how to prevent infection.

Search Menu