Search10 Results

This article provides guidance for securing your phones and other mobile devices, such as tablets.
This article explains IC's password requirements and how to choose, remember, and change your IC password.
Phishing is defined as trying to obtain financial or other confidential information from someone by imitating a trusted organization or person. This article explains how to spot phishing emails, including some helpful examples of real phishing attempts at IC.
Ithaca College IT provides an anti-virus/anti-malware program from Microsoft for all college-owned Windows and macOS computers. For Windows, the program is called either Windows Defender or Windows Security. macOS will use Microsoft Defender. This guide describes how to scan your computer using this software to search for malicious programs.
This article answers some frequently asked questions about malware.
Ithaca College provides Single Sign-On capabilities through integration with various College systems via SAML2 capable Identity Provider.
A virtual private network (VPN) establishes a secure connection between your computer and the VPN server in the internet. This means that no one besides the VPN provider can see your traffic, so you can browse the internet without other people on an unprotected Wifi network or your internet service provider seeing what you do. Ithaca College’s GlobalProtect VPN does not provide all of these features, so this article contains recommendations for 3rd party VPN providers.
At Ithaca College, behavior regarding the use of technology and computers is governed by the All College Computer Use policy, the College Web and Information Systems policy and the Student Conduct Code. In general, if you wouldn't do it in the real world, don't do it in the cyber world.
This article answers some frequently asked questions about ransomware.
This article covers common questions around the Duo Multi Factor Authentication Service.