Search14 Results

This article provides general awareness information about and instructions for responding to phishing campaigns.
Annual cybersecurity awareness training is an effective way to help our university community identify and prevent the loss of sensitive data and protect campus data resources. Security awareness training gives employees the information they need to identify the greatest cyber security threats faced by universities and colleges, including phishing emails that are designed to trick you into revealing sensitive university or personal data. United Educators training is a requirement.
Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.
This article describes the steps to take and what to look for in an email to help you identify an email phishing scam and protect your personal information. This article is for students, faculty, and staff.
This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.
This article describes ransomware and advises employees on what to do if they think they have been infected by this type of malware.
This article provides information on preventing, identifying, and/or responding to a malware attack.
This article provides examples of student employment-related email scams.
ISU employees must follow security-related best practices. Such practices are common across many different computer environments, and apply on personal computers as well as ISU computers.
Malicious actors are using the Coronavirus event as a basis for sending phishing emails, purporting to offer information or fraudulent grant money.
How to recognize and report email phishing attempts with a "current event"-type subject
This article describes how to recognize and react to fake job offer scams.
This standard describes the benefits and key features of the ISAD domain, how to connect a system to the ISUAD domain, and the requirements for a domain exemption.