Information Technology

Yahoo security breach - Friday, September 23, 2016

Yahoo announced that 500 million user accounts were hacked and the account info was sold to internet criminals.  

  • If you have a Yahoo account, open your browser and go to Yahoo. Do not use a link in any email. Reset your password and make it a strong, complex password or pass-phrase. 
  • If you did use your Yahoo passwords on other sites, go to those sites and change the password there too.  Also change the security challenge questions.

 Expect cyber criminals to take advantage of the publicity from this event and send phishing emails claiming you need to change your Yahoo account.   Be wary of emails that relate to Yahoo in any way, they may be fraudulent.   If in doubt, do not supply any personal information or click on links contained within.


Information Security

Welcome to the Information and Cyber Security website! The INTERNET connected world is full of things.  There are good things, like keeping in touch with family and friends, collaboration, organization and research.  There are risks as well, things like ransomware, identity theft and compromised sytems and accounts.   

This site is about helping you safely get through the not so good parts.  Explore and learn about how to protect your computing environments from current cyber vulnerabilities and threats. 



Change your Password

Report an Issue

Contact Info Security

Report a Suspicious Email


Windows Tech Support Scam



Access Your Network Share

Backing up your Data

Training and Other Resources

Our favorite posters


Follow these four simple best practices to ensure a cyber-safe computing experience while studying and working here at Fort Lewis.

      Did you know your system can get infected with malware just be visiting a site, even if you do not click on anything? Read about best practice #1 here.



Cyber criminals want YOUR email and network account credentials and they are at work  every day to get them.  Stop them!  Read more about best practice #2 here.          


It's easy to click on pictures, attachments and links, especially when they seem to come from friends, family and social media.  Things aren't always as they seem...   Read more about best practice #3 here.


Despite best efforts, sometimes files become lost or systems compromised.  When this happens, backups are almost as good as a time machine.  Read more about best practice #4 here.