Skip to main content


Secure Your Home

Secure your Wi-Fi network.
If a criminal can get control of your home wireless router, they can use it to access all your connected devices. Secure your Wi-Fi network and digital devices by changing the factory-set...Read more

It's possible that in the aftermath of Hurricane Harvey, you may receive phishing emails, or see websites, ads, and other media created by scammers trying to take advantage of the tragedy.Read more

Technology Risk Assessments (TRAs) help identify risks from the use of technology that could potentially cause information loss or financial or reputational harm to the university. A TRA helps determine if technology acquisitions comply with federal and state laws and Cornell policy for...Read more

Encryption is the process of scrambling data to make it unreadable to anyone who does not possess the proper key. When you encrypt an entire disk using FileVault, all of the files on the computer are encrypted, including:

Operating system files Application files Data files Swap files Free...Read more