Service KBAs Security & Policy Articles Protect University Data Travel Internationally with Technology Consequences of Mishandling Sensitive Data Data Types (High Risk, Moderate Risk, Low Risk) Dispose of High Risk Data Encrypt Computer (Required for Confidential Data) Find High Risk Data on My Computer Handle Paper Documents with High Risk Data Information Security Policy Overview (Policy 5.10) Protect Data in the Cloud Protect Evidence of a Possible Data Compromise Report Security Incidents (Compromised Data, Virus, etc.) Responsibilities to Protect University Data (Policy 4.12) Share High-Risk Data Store Confidential Data Why NetID Passwords Are Valuable Tips to Minimize IT Security Risks IT Security Liaisons IT Security Videos Why Some Websites are Blocked Computer Backups Against Ransomware and Other Cybercrime Export-Controlled Information Changes to Policy 5.10 Information Security Work Off-Campus Securely Travel Internationally with Technology Using Computers You Don't Own Security Practices When Working from Home Spot Fraudulent Emails (Phishing) Tools for Working Remotely Working with High Risk Data Data Types (High Risk, Moderate Risk, Low Risk) Dispose of High Risk Data Encrypt Computer (Required for Confidential Data) Find High Risk Data on My Computer Handle Paper Documents with High Risk Data Share High-Risk Data Changes to Policy 5.10 Information Security Use Email Safely Watch Out for Whaling: Phishing Targeting Leaders Tips To Avoid Fake Student Job Postings That Can Cost You Money Find Out Where an Email Came From (Read Email Headers) Spot Fraudulent Emails (Phishing) Cornell Email Addresses are Being Faked IT Security Videos Watch Out for Coronavirus Scams Protect Yourself Against a Two-Factor Phishing Attempt Protect Your Cornell Identity Biometrics and Your Privacy Change Your NetID Password How NetID Passwords are Stolen Identity Theft Resources Manage Passwords Safely Report if My NetID Password has Been Stolen Set NetID Password Security Questions Signs Your NetID Password May Have Been Stolen Why NetID Passwords Are Valuable Recognize Possible Security Problems Spot Fraudulent Emails (Phishing) NetID Terms and Conditions NetID: Password Doesn't Work IT Security Videos What You Should Know About Cryptocurrency Mining, Security, and University Policy Students: Protect Your Data, Identity, and Privacy Protect Yourself Against a Two-Factor Phishing Attempt Beware Tax-Related Fraud and Scams Use the Internet Safely Safe Links For Content Creators Safe Links Warning Pages Safe Links Clear Your Browser Cookies, Cache, and History Cyberscams Capitalize on Tragic Events Enhance Web Browser Security Identify Risky End-user License Agreements (EULAs) Keep Malware (Viruses, Trojans, Worms) Off My Computer Opt Out of Market Research Protect My Privacy Read Web Addresses (URLs) in Email and Online Stop Websites From Installing Software Without Approval (Drive-By Download) Verify if a Website is Who it Claims to Be (EV Certs) Cornell Complies with the Higher Education Opportunity Act (HEOA) eCornell Copyright Education Legal Music and Video Sources IT Security Vocabulary IT Security Videos What You Should Know About Cryptocurrency Mining, Security, and University Policy Protect Yourself Against a Two-Factor Phishing Attempt Secure Computers and Mobile Devices Biometrics and Your Privacy Set Up Biometrics on Your Device Data Hygiene Best Practices Dispose of High Risk Data Encrypt Computer (Required for Confidential Data) Recognize Possible Security Problems Tips to Minimize IT Security Risks Travel Internationally with Technology Security Practices When Working from Home What You Should Know About Cryptocurrency Mining, Security, and University Policy