This site is about helping you safely navigate in the cyberworld. Explore and learn about how to protect your computing environments from current cyber vulnerabilities and threats.
Change your Password
Get Help from IT
Report a Suspicious Email
Access Your Network Share
Common Cybersecurity Threats
Handling Data Safely
Backing up your Data
Password Management
Anti-Virus Software
Avoiding Bad Links
Ninjio for Friends and Family
Zoom
Copyright Policy
Training and Other Resources
At the beginning of each month, staff and faculty are emailed quick and fun cybersecurity videos to keep you up to date on real-life recent cyber security threats, and how to thwart them. Video episodes are under 4 minutes, and have a short knowledge check quiz at the end. These trainings are compiled and hosted by NINJIO, and include infographics throughout the month to help remind you to stay vigilant. You will also receive occasional Personal Learner Summary Reports to remind you of any NINJIO trainings you missed, and cumulative quizzes to refresh what you've learned over several episodes.
Cybersecurity training is required by the State of Colorado to be provided and administered by the employer, and be reviewed by employees.
Did you know your system can get infected with malware just by visiting a site, even if you do not click on anything? Out of date web browsers and plugins are HIGHLY susceptible to malware and can allow your system to be infected while the web page is loading.
When your browser plug-in components like Java, Adobe Flash and Microsoft Silverlight prompt you to update, take the time to save your work and apply the update.
View this external link Securing your Web Browser on how to update these components and more.
Your account credentials (user ID and password) are the number one thing that cyber criminals are trying to get. Account credentials are the key that unlocks the door to your personal data, bank accounts, research, and sometimes other people's sensitive data.
Review these guidelines:
It's easy for cyber-criminals to send pictures, attachments and links in social media chats or emails that look like they from a friend or family member. Avoid opening attachments and be wary of clicking on pictures. Hover your cursor over links and images to inspect the URL before you click. Know where you going before you click!
Despite the best efforts, sometimes files become lost or systems compromised. When this happens, the only thing you can do is restore from a backup. One thing to consider is that applications and operating systems can be re-installed, so it is not necessary to back those up. Your documents, pictures, emails, presentations, etc. are unique files that can be lost if you do not have a copy stored somewhere.
A simple way to backup files is to keep a copy on the network share. Available on campus and from the Internet, https://webfiles.fortlewis.edu/ provides you a folder to store copies of your important files in.
You may want to keep copies of important files on removable media, such as USB storage.