Service KBAs Security & Policy Articles Use the Internet Safely Protect Personal Details from Online Harassment Securely Use Cloud Storage Services Safe Links For Content Creators Safe Links Warning Pages Safe Links Clear Your Browser Cookies, Cache, and History Cyberscams Capitalize on Tragic Events Enhance Web Browser Security Identify Risky End-user License Agreements (EULAs) Keep Malware (Viruses, Trojans, Worms) Off My Computer Opt Out of Market Research Protect My Privacy Read Web Addresses (URLs) in Email and Online Stop Websites From Installing Software Without Approval (Drive-By Download) Verify if a Website is Who it Claims to Be (EV Certs) Cornell Complies with the Higher Education Opportunity Act (HEOA) eCornell Copyright Education Legal Music and Video Sources IT Security Vocabulary What You Should Know About Cryptocurrency Mining, Security, and University Policy Protect Yourself Against a Two-Factor Phishing Attempt Secure Computers and Mobile Devices Biometrics and Your Privacy Set Up Biometrics on Your Device Data Hygiene Best Practices Dispose of High Risk Data Encrypt Computer (Required for Confidential Data) Recognize Possible Security Problems Tips to Minimize IT Security Risks Travel Internationally with Technology Security Practices When Working from Home What You Should Know About Cryptocurrency Mining, Security, and University Policy Protect University Data Information Protected by FERPA General Information About FERPA Annual Cybersecurity Awareness Training Securely Use Cloud Storage Services Consequences of Mishandling Sensitive Data Data Types (High Risk, Moderate Risk, Low Risk) Dispose of High Risk Data Encrypt Computer (Required for Confidential Data) Find High Risk Data on My Computer Handle Paper Documents with High Risk Data Information Security Policy Overview (Policy 5.10) Protect Data in the Cloud Protect Evidence of a Possible Data Compromise Report Security Incidents (Compromised Data, Virus, etc.) Responsibilities to Protect University Data (Policy 4.12) Share High-Risk Data Store Confidential Data Why NetID Passwords Are Valuable Tips to Minimize IT Security Risks Travel Internationally with Technology IT Security Liaisons Why Some Websites are Blocked Computer Backups Against Ransomware and Other Cybercrime Export-Controlled Information Changes to Policy 5.10 Information Security Protecting Against Digital Harassment Hide Your Campus Phone Number from the Cornell Online Directory Report Online Harassment Protect Personal Details from Online Harassment Support for Victims of Online Harassment Prevent Online Harassment with Technology Services Work Off-Campus Securely Travel Internationally with Technology Using Computers You Don't Own Security Practices When Working from Home Spot Fraudulent Emails (Phishing) Tools for Working Remotely Working with High Risk Data Information Protected by FERPA General Information About FERPA Securely Use Cloud Storage Services Data Types (High Risk, Moderate Risk, Low Risk) Dispose of High Risk Data Encrypt Computer (Required for Confidential Data) Find High Risk Data on My Computer Handle Paper Documents with High Risk Data Share High-Risk Data Changes to Policy 5.10 Information Security Use Email Safely Report Suspicious Email with PhishAlarm Watch Out for Whaling: Phishing Targeting Leaders Tips To Avoid Fake Student Job Postings That Can Cost You Money Find Out Where an Email Came From (Read Email Headers) Spot Fraudulent Emails (Phishing) Cornell Email Addresses are Being Faked Watch Out for Coronavirus Scams Protect Yourself Against a Two-Factor Phishing Attempt Protect Your Cornell Identity Biometrics and Your Privacy Change Your NetID Password How NetID Passwords are Stolen Identity Theft Resources Manage Passwords Safely Report if My NetID Password has Been Stolen Set NetID Password Security Questions Signs Your NetID Password May Have Been Stolen Why NetID Passwords Are Valuable Recognize Possible Security Problems Spot Fraudulent Emails (Phishing) NetID Terms and Conditions NetID: Password Doesn't Work What You Should Know About Cryptocurrency Mining, Security, and University Policy Beware Tax-Related Fraud and Scams Students: Protect Your Data, Identity, and Privacy Protect Yourself Against a Two-Factor Phishing Attempt