Skip to main content

Cornell University

Displaying 41 - 60 of 251

Enhanced Device SafetyEventually, Beyond Identity (Cornell's passkey provider) will check how secure a device is before allowing it to access sensitive Cornell resources. For example, Cornell may…

Related to:
Audience:
Related Services:
Secure Connect
Topics:
Project Updates

Whether you’re using Box, SharePoint, or Microsoft Teams, collaborating on a document with coworkers is often as simple as sharing a link. However, this convenience can have steep cybersecurity…

Related to:
Audience:
Related Services:
Box, Collaboration Tools, National Cybersecurity Awareness Month, SharePoint
Topics:
NCSAM Topics, Using SharePoint, Get Started with Box

To create a safe space in which the Cornell community could explore change management, the Emerging Tech Dialogue: Navigating Change symposium focused on conversations rather than slide decks. Please…

Related to:
Audience:
Related Services:
Emerging Tech Dialogues
Topics:
Navigating Change

Artificial intelligence is a tool with the potential to do great good in the world. Perhaps you’ve already benefited from it, using it to analyze data or solve a problem. But like any tool used…

Related to:
Audience:
Related Services:
National Cybersecurity Awareness Month
Topics:
NCSAM Topics

Related to:
Audience:
Related Services:
Emerging Tech Dialogues
Topics:
Navigating Change

Apple Computer Hardware Repair Welcome to CIT’s Apple Computer Hardware Repair. We are an Official Apple Authorized Service Provider (AASP) Shop. Our team members are all Apple Certified…

Related to: apple
Audience:
Faculty, IT Professionals, Staff, Students
Related Services:
Computer Hardware Repair
Topics:
Request Warranty Repair

Dell Computer Hardware RepairDell warranty hardware repair and parts quotes from the Computer Hardware Repair Team may only be requested by a department’s technical support provider (TSP).…

Related to: dell
Audience:
Faculty, IT Professionals, Staff
Related Services:
Computer Hardware Repair
Topics:
Get Started with Dell Warranty Hardware Repair

Thanks to technology, your personal and financial information are accessible to you from anywhere that the internet is available. This is convenient, but it also comes with risk. If all you need to…

Related to:
Audience:
Related Services:
National Cybersecurity Awareness Month
Topics:
NCSAM Topics

Searching the Web Versus Prompting AIWhen you search for information on the web, your search results give you a list of resources to peruse. If you want information about how the sun makes northern…

Related to:
Audience:
Related Services:
Microsoft 365 Copilot Chat, SandboxAI
Topics:
Resources, Training, Artificial Intelligence, Use Copilot Chat, Using A.I.

Since the PhishAlarm feature was introduced earlier this year, more than 6,000 potential threats have been reported. This number is only expected to rise as generative AI is making it easier than…

Related to:
Audience:
Related Services:
National Cybersecurity Awareness Month
Topics:
NCSAM Topics

LastPass recommends the following steps to resolve the issue:Update your LastPass browser extension to the latest version. Visit Download LastPass for information on the latest version and how…

Related to:
Audience:
Related Services:
Secure Password Management
Topics:
Troubleshooting

When you are creating a new team in Microsoft Teams, choose the Cornell Standard Team type unless you need specific functionality only available in one of the other templates. Choosing Class, Staff,…

Related to:
Audience:
Related Services:
Microsoft Teams
Topics:
Guidelines and Recommendations

Chat histories are connected to your NetID. You should be able to access chats in different browsers, but it may take a few minutes for your chat history to sync.Chat History in EdgeClick on the…

Related to:
Audience:
Related Services:
Microsoft 365 Copilot Chat
Topics:
Use Copilot Chat

Beyond Identity is Required The Beyond Identity Authenticator software is required to use passkeys. You should not need to install the Beyond Identity software manually. It will appear in your…

Related to:
Audience:
Related Services:
Secure Connect
Topics:
Get Started, Using Secure Connect

Cornell Microsoft 365 accounts owned by someone who has left become read-only as a step toward eventual deletion. The past owners of these accounts are not able to access them after they leave.…

Related to:
Audience:
Related Services:
OneDrive
Topics:
Troubleshooting

It can be tempting to hit "snooze" on that update alert on your phone, browser, or computer. But letting your device or software update right away could mean the difference between having a smoothly…

Related to:
Audience:
Related Services:
National Cybersecurity Awareness Month
Topics:
NCSAM Topics

Access is currently limited. If you have an institutional problem that requires data-protected AI to help solve, please submit a request to access this tool.To Access SandboxAIGo to the link you…

Related to:
Audience:
Related Services:
SandboxAI
Topics:
Artificial Intelligence

Access Policy Violation ErrorSafari has a built-in privacy feature that allows individuals to block IP address tracking. This conflicts with a security checks that Secure Connect has in place. Beyond…

Related to:
Audience:
Related Services:
Secure Connect
Topics:
Troubleshooting

Automatic updates to Sequoia enabled a privacy feature on Apple devices that automatically turns on private Wi-Fi addresses. This forces those using RedRover and Cornell-Visitor to complete the…

Related to:
Audience:
Related Services:
Wi-Fi
Topics:
RedRover Wi-Fi, Register and Connect, Troubleshooting, Visitor Wi-Fi, eduroam (Secure Wi-Fi)

Confirmation emails with Zoom links will be sent to all registered attendees on Monday, October 14, 2024.RegistrationRegister today. This event is open to all Cornell-affiliated community members…

Related to:
Audience:
Related Services:
Emerging Tech Dialogues
Topics:
Events, Navigating Change

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.