Search This Site


Main menu

Past News Articles

December 03, 2018

SCAM: Gift Card Phish

The scam appears to come from someone in a leadership role at the University, and asks the employee for help with purchasing various gift cards (e.g., Amazon, iTunes).


October 31, 2018

Extortion Phish

Do not trust the phish!  If you receive an email from someone who claims to have your password or other private information, report it to [email protected].


October 22, 2018

Cybersecurity Awareness Month - Week 4

"Our day-to-day life depends on the country's 16 sectors of critical infrastructure, which supply food, water, financial services, public health, communications and power along with other networks and systems.  A disruption to this system, which is operated via the internet, can have significant and even catastrophic consequences..."


October 15, 2018

Cybersecurity Awareness Month - Week 3

The lines between our work and daily lives are becoming increasingly blurred, and it is more important than ever to be certain that smart cybersecurity practices carry over between the two. When you are on the job...your organization's online security is a shared resonsibility.  


October 11, 2018

Cybersecurity Awareness Month - Week 2

National Cyber Security Awareness Month (NCSAM) – observed every October – was created to ensure every American has the resources they need to stay safer and more secure online. The theme for Week 2 emphasizes the limitless opportunities to educate students of all ages – from high school into higher education and beyond – on the field of cybersecurity as they consider their options.


October 01, 2018

Cybersecurity Awareness Month

This week is the beginning of the 15th annual National Cyber Security Awareness Month (NCSAM), an extensive online safety awareness and education initiative co-led by the National Cyber Security Alliance (NCSA) and the U.S. Department of Homeland Security (DHS).



Report an Information
Security Incident

Please report any level of incident, no matter how small. The Information
Security office will evaluate the report and provide a full investigation if appropriate.

Complete Report Form