How to protect against phishing, malware, and other threats.

Categories (3)

Duo Multifactor Authentication

Duo is Ithaca College's multifactor authentication (MFA) tool, which provides more robust security compared to only using a password, and minimizes the chance of unauthorized access to your accounts.

If you are already enrolled in Duo Multifactor Authentication (MFA), and would like to make a change to your DUO settings or devices, please use this link: https://www.ithaca.edu/duo/device

Self-Service Password Reset (SSPR)

Manage your password for Ithaca College accounts.

If you are enrolled in Self-Service Password Reset (SSPR), please use this link to reset your password: https://passwordreset.microsoftonline.com/

If you are not enrolled in Self-Service Password Reset (SSPR), please submit a ticket using this link: https://help.ithaca.edu/TDClient/34/Portal/Requ...

Policies

Technology use, privacy, network, and copyright policies

Articles (13)

Pinned Article Recognizing Phishing Emails

Phishing is defined as trying to obtain financial or other confidential information from someone by imitating a trusted organization or person. This article explains how to spot phishing emails, including some helpful examples of real phishing attempts at IC.

Best Practices for Mobile Device Security

Mobile devices and tablets run applications to perform a variety of functions. These device functions range from operations as simple as web browsing and e-mail to more complex functions, like multimedia editing and file access. They can connect to wireless networks and can often include the ability to connect directly to cellular data services, even when outside the range of a Wi-Fi signal. This article covers best practices for mobile device security.

College iPad Usage and Restriction Guidelines

This knowledgebase article provides an overview of the restrictions placed on college-owned iPads, the reasons behind these restrictions, and the process to request changes to these restrictions. The aim is to maintain the security and proper management of iPads within the college, ensuring the safety of sensitive information and preventing unauthorized access or misuse.

FAQ: Malware

This article answers some frequently asked questions about malware.

FAQ: Mobile App Management (MAM) User Experience

User Experience and Tasks with first time setup of App Protection Policies on a mobile device.

FAQ: Ransomware

This article answers some frequently asked questions about ransomware.

Microsoft Mobile App Management (MAM)

Microsoft Mobile App Management overview

QR Code Phishing

Security information regarding QR code phishing

Quick Guide: Windows Defender and Windows Security

Ithaca College IT provides an anti-virus/anti-malware program from Microsoft for all college-owned Windows and macOS computers. For Windows, the program is called either Windows Defender or Windows Security. macOS will use Microsoft Defender. This guide describes how to scan your computer using this software to search for malicious programs.

Quick Guide: Windows Defender Offline

Windows Defender Offline is a powerful anti-virus tool built into Windows 10. It detects and removes malware that can hide from conventional anti-virus software. This guide describes how to scan your computer with Windows Defender Offline.

Recommended Virtual Private Network (VPN) Providers

A virtual private network (VPN) establishes a secure connection between your computer and the VPN server in the internet. This means that no one besides the VPN provider can see your traffic, so you can browse the internet without other people on an unprotected Wifi network or your internet service provider seeing what you do. Ithaca College’s GlobalProtect VPN does not provide all of these features, so this article contains recommendations for 3rd party VPN providers.

Reporting Computer Abuse

At Ithaca College, behavior regarding the use of technology and computers is governed by the All College Computer Use policy, the College Web and Information Systems policy and the Student Conduct Code. In general, if you wouldn't do it in the real world, don't do it in the cyber world.