News and Alerts

Stop Think Connect

Self-Protection

Creating a Strong Password

Protecting Data

External Resources

Guildlines, Standards, & Policies

Bookmark and Share

Information Security

Monthly Security Tip Newsletters 

 Date Issued Subject
June 2014 Bots, Botnets, and Zombies
May 2014 Protecting Against Mobile Malware     
April 2014 Hacked! Now What?
January 2014  Cyber Security Outlook 

SUNY NY-Alert Faculty/Staff

HOW TO SUBMIT YOUR EMERGENCY CONTACT INFORMATION

  1. Go online to http://www.suny.edu/sunyalertsec and select Cortland from the college drop-down box.

  2. Under enter user ID, type in the same name you use to log on to your office computer and also enter the same password you use on campus.

  3. A SUNY Emergency Alert page will appear. Enter your appropriate contact information, then choose submit. If all the fields have been correctly filled, you will be able to select confirm and sign-off.

NOTE: We recommend that you supply at least one e-mail address and cell phone number. There is no need to provide a fax number. Please do not supply a text-messaging number if your carrier is not listed on the menu. NY-Alert continues to expand its services to other carriers and we will have regular updates to the system.

How to recognize phishing email messages, links, or phone calls

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer.

Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website. 

What might a phishing email message consist of?

  • Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling.
  • Beware of links in email. If you see a link in a suspicious email message, don't click on it. Links might also lead you to .exe files. These kinds of file are known to spread malicious software.
  • Threats. Have you ever received a threat that your account would be closed if you didn't respond to an email message?
  • Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows.

Beware of phishing phone calls

Cybercriminals might call you on the phone and offer to help solve your computer problems or sell you a software license. Neither Microsoft nor our partners make unsolicited phone calls (also known as cold calls) to charge you for computer security or software fixes. 

Once they've gained your trust, cybercriminals might ask for your user name and password or ask you to go to a website to install software that will let them access your computer to fix it. Once you do this, your computer and your personal information is vulnerable.

Treat all unsolicited phone calls with skepticism. Do not provide any personal information.

To read the entire document: How to Recognize Phishing Email messages, links, or phone calls

For even more information follow this link: http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx


 Online Shopping Security Links

What to do if you encounter problems with online shopping sites:

If you have problems shopping online, contact the seller or site operator directly. If those attempts are not successful, you may wish to contact the following entities:

For additional information about safe online shopping, please visit the following sites: