Skip to main content

Cornell University

Security & Policy

Stylized display of lock and circuits

Watch out for identity theft! Take steps now to protect your personal identity and financial information from security breaches. Safeguard your devices and find out more with identity theft resources.

Unsure about an email?

Use Two-Step Login for added security

With Two-Step Login, even if your password is stolen, the second step of the login process will prevent a thief from breaking in.

Protect Yourself from Scams

On This Page

Get Help for IT Security Problems

NetID Password Compromise

Do you suspect your NetID password has been stolen?

  1. Change your password immediately. Contact the IT Service Desk if you can't change your password.
  2. Report the incident immediately to the IT Security Office.

Computer Compromise

Do you suspect your system has been hacked or downloaded a virus?

  1. Disconnect from the network by turning off Wi-Fi and unplugging Ethernet.
  2. Contact the IT Service Desk for help. Phone: 607-255-5500.

More for IT Security and Policy

Department Liaisons

Department staff who help ensure appropriate measures are taken in response to a security incident.

Student Security Resources

Links to security services most useful for students.

Vocabulary

Short explanations of terms used in these security pages.

IT Policy

The IT policies that ensure legal and appropriate use of university resources and keep data private and secure.

Scary-looking fish.

Fight Phishing! Don't Get Hooked.

PhishAlarm, a new faster way to report suspicious email to the IT Security Office, is now available on all Gmail web and Outlook web, desktop, and mobile interfaces.

Check the Phish Bowl to see phishing (fake) emails that have been spotted at Cornell.

Have you received an email claiming to be from Cornell? Make sure it's legitimate by checking Verified Cornell Communications (login required).

Data Privacy

Remember to Share with Care.

  • What you post can last a lifetime: Before posting online think about how it might be perceived now and in the future and who might see it.  
  • Own your online presence: Set the privacy and security settings on web services and devices to your comfort level for information sharing. It’s okay to limit how and with whom you share information.  
  • Be aware of what’s being shared: Be aware that when you share a post, picture, or video online, you may also be revealing information about others. Be thoughtful when and how you share information about others.
  • Post only about others as you would have them post about you: The golden rule applies online as well.  

Personal Information Is Like Money. Value It. Protect It.

  • Think before you act: Be wary of communications that implore you to act immediately, offer something that sounds too good to be true, or ask for your personal information.  
  • Lock Down Your Login: Protect your online accounts by enabling the strongest authentication tools available, such as biometrics, security keys, or a unique one-time code through an app on your mobile device. Your usernames and passwords are not enough to protect key accounts like email, banking, and social media.

Support Contact:

Cornell IT Service Desk

Normal Business Hours: Monday-Friday, 8am-6pm (Eastern Time)
Emergency Service Disruptions: After Hours Support

Comments?

To share feedback about this page or request support, log in with your NetID

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.