SUNY NY-Alert Faculty/Staff
The SUNY NY-Alert system is designed to alert you in cases where your personal safety may be at risk. For this reason it is critical that you provide the SUNY NY-Alert system with you email address, and cell phone number for text messaging.
HOW TO SUBMIT YOUR EMERGENCY CONTACT INFORMATION
Go into myRedDragon
Select the Faculty/Staff Tab
Select the SUNY Portal Login link
Select "SUNY Emergency Contact System" under important Information
- A SUNY Emergency Alert page will appear. Enter your appropriate contact information, then choose Submit. If all the fields have been correctly filled, you will be able select confirm and logoff.
NOTE: We recommend that you supply at least one email address and cell phone number. There is no need to provide a fax number. Please do not supply a text-messaging number if your carrier is not listed on the menu. NY-Alert continues to expand its services to other carriers and we will have regular updates to the system.
|May 2015||Don't Take the Bait on Phishing Scams|
|June 2014||Bots, Botnets, and Zombies|
|May 2014||Protecting Against Mobile Malware|
|April 2014||Hacked! Now What?|
|January 2014||Cyber Security Outlook|
How to recognize phishing email messages, links, or phone calls
Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.
Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.
What might a phishing email message consist of?
- Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling.
- Beware of links in email. If you see a link in a suspicious email message, don't click on it. Links might also lead you to .exe files. These kinds of file are known to spread malicious software.
- Threats. Have you ever received a threat that your account would be closed if you didn't respond to an email message?
- Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows.
The goal of information security is to protect the confidentiality, availability, and integrity of information and information systems.
Office of Information Technology Services
Online Shopping Security Links
What to do if you encounter problems with online shopping sites:
If you have problems shopping online, contact the seller or site operator directly. If those attempts are not successful, you may wish to contact the following entities:
For additional information about safe online shopping, please visit the following sites: