When changing your NetID password, keep in mind:
It CANNOT be the same as any NetID password you have used in the past.
It should not be similar to the old...
You are tricked into giving away your NetID password
These days we are overwhelmed by fraudulent email messages and websites that try to steal personal information. These are often...
Keeping your personal information, Cornell sign-in credentials, and important data safe means protecting your passwords. Anyone with active online accounts encounters dozens of passwords used to...
Only the individual for whom the NetID is issued may use it according to University Policy 5.8, Authentication to Information Technology Resources. The policy outlines rules each community member...
If you type in the same password as always, but you get an "incorrect password" message no matter how carefully you check and retype it, your password may have been stolen. The person who...
Fraudulent emails (see how to spot them) are a common way to steal Cornell NetIDs and passwords, and gain access to your private information. Even with two-factor authentication enabled, criminals have found ways to trick users into giving away their login credentials.
If you suspect that your NetID password has been compromised, don't hesitate to act. Immediately take the following steps to protect your privacy and prevent data loss.
1. Report the...
Have you set your security questions?
Don’t wait until you have a password problem! If you haven’t already done so, set your NetID password security questions now. Only select...
If your NetID password is stolen and your NetID is used to send email spam, there can be a number of warning signs:
You start receiving large numbers of messages that were rejected by...
Step One Is Always Confirm the Source
If you receive an unexpected message that asks you to take action by clicking a link or to do something unusual like sending a gift card, check the...
Protect your NetID and password. At universities across the country, the theft of electronic IDs is a rapidly growing problem.
Your NetID is your online identity at Cornell
Used with...
It is easy to fake what appears in the From or Reply-to line of an email message. Check the message headers to discover the message's real origin. Message headers are the material that comes...
To stop uploading, you must do one of the following:
Completely remove the filesharing software from your computer (recommended). See directions below.
Locate and change the...
Step One Is Always Confirm the Source
If you receive an unexpected message that asks you to take action by clicking a link or to do something unusual like sending a gift card, check the...
The Cornell IT Security Office (ITSO) recommends the following baseline precautions while traveling internationally. In the event your devices are lost, stolen, or altered while traveling,...
You will not be able to access most of your Cornell accounts after you graduate. Plan now to transfer data important to you, such as email, files, passwords, surveys, publications, research, blogs, presentations, etc.
If you are working in an area that has restricted, weak, or slow Wi-Fi, or weak cellular service indoors, consider whether these options might be useful. Please note that Cornell does not endorse...
For information on how to teach remotely, visit the Center for Teaching Innovation's Planning for Teaching Remotely.
See what tools can help you work remotely.
Please also see COVID-19:...
Whether for personal reasons (illness, family care, etc.) or broader situations (pandemic, severe weather, etc.), you may need to be able to conduct your work from remote locations. This article summarizes how university IT services can help with that.
Comments?