Digital Security Overview

Summary

Indiana State University emphasizes the shared responsibility of its campus community in maintaining digital security by being vigilant against social engineering tactics such as phishing, impersonation, and urgency-based scams. The university encourages the use of multifactor authentication, strong passwords, cautious handling of unexpected requests and suspicious links, prompt reporting of suspicious emails, and immediate notification to the Help Desk if accounts are suspected to be compromise

Body

Digital Security Is Everyone’s Responsibility

Being a Sycamore means looking out for one another, and that includes our digital spaces. Every member of our campus community plays a role in protecting personal and university data. By staying alert and informed, you help keep our digital environment safe for yourself and those around you.

Remember, protecting our campus starts with each of us. Together, we can outsmart cyber threats and foster a safe, welcoming environment for all Sycamores. If you ever have questions or concerns, your Help Desk is a call away!

Understanding Social Engineering

Social engineering refers to tactics that scammers use to manipulate people into giving up confidential information or access. Rather than hacking computers, they try to "hack" your trust. Here is what you need to know:

  • Phishing: You might receive emails or messages that look official but ask you to click a link, open an attachment, or share personal information. Always check the sender and think twice before responding.
  • Impersonation: Sometimes, scammers pretend to be someone you know—like a professor, university staff, or even a fellow student—to get you to share information or send money.
  • Urgency and Fear: Many scams use pressure tactics, telling you there is an emergency or that you will face trouble if you do not act quickly. Take a moment to pause and verify before taking any action

How You Can Stay Cyber Safe

Risk mitigation is about making smart choices and forming good habits:

  • Use multifactor authentication (Microsoft Authenticator) and never share your code.
  • Use strong passwords and never share them with anyone.
  • Question unexpected requests for sensitive information—even if they seem to come from someone you know.
  • Be cautious with links and attachments in emails and messages—when in doubt, do not click.
  • Keep your devices updated to protect against the latest threats.
  • Use the “Report” button in your email to notify your security team.
  • Notify the Help Desk if you suspect your account has been compromised.

Additional Information

For more information, consider one of the following articles:

Details

Details

Article ID: 168241
Created
Fri 8/15/25 11:27 AM
Modified
Tue 9/30/25 3:43 PM

Related Articles

Related Articles (4)

As higher education institutions increasingly rely on digital technology for teaching, research, and administration, the importance of cybersecurity cannot be overstated. Cyber threats such as phishing attacks, data breaches, ransomware, and social engineering have become common, targeting universities, colleges, and those who work and study within them. Staff, faculty, and students are collectively responsible for safeguarding personal and institutional data. This knowledge base article outline
Digital safety is a shared responsibility. By remaining vigilant, adopting best practices, and staying informed, staff, faculty, and students can substantially reduce cyber risks and contribute to a safer, more secure higher education environment. Remember—cybersecurity is not only about technology; it’s about people, awareness, and proactive action.
This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.
This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.

Related Services / Offerings

Related Services / Offerings (1)

Security Consultation: security best practices for business use cases, risk assessment requests, and data security considerations.