cybersecurity
Content (20)
AI meeting assistants or “bots” can be used for monitoring, summarizing, and recording virtual meetings. They are powerful tools for the purposes of accessibility and convenience but should also be used with caution. Whenever AI is involved, you should know how its use could impact your privacy and…
Many in the Cornell community have reported receiving fraudulent emails from PayPal. The emails may look like this example from the Phish Bowl.
Cornell has implemented Duo’s Verified Push for university faculty and employees.Verified Push was piloted by CIT staff and IT Service Group directors. It has also been in use at Weill Cornell Medicine and other major institutions with no adverse impact, becoming the new minimum standard for…
National Cybersecurity Awareness Month has come to an end, but the mission remains. Scammers don’t take a break, and neither can our community afford to forget important cybersecurity tips and tools. You can help Secure Our World in so many ways! 1. Share links the safe way in SharePoint…
Whether you’re using Box, SharePoint, or Microsoft Teams, collaborating on a document with coworkers is often as simple as sharing a link. However, this convenience can have steep cybersecurity consequences.
Artificial intelligence is a tool with the potential to do great good in the world. Perhaps you’ve already benefited from it, using it to analyze data or solve a problem. But like any tool used irresponsibly, or in the wrong hands, artificial intelligence can do harm. If not used safely, it can…
Thanks to technology, your personal and financial information are accessible to you from anywhere that the internet is available. This is convenient, but it also comes with risk. If all you need to access your account is “hello123,” then it will be easy for anyone else with an interest in your…
Since the PhishAlarm feature was introduced earlier this year, more than 6,000 potential threats have been reported. This number is only expected to rise as generative AI is making it easier than ever for hackers to automate their scams and make their attempts look less suspicious. The more…
It's National Cybersecurity Month and that means it's time to dust off the tips and tools that protect the Cornell community.It can be tempting to hit "snooze" on that update alert on your phone, browser, or computer. But letting your device or software update right away could mean the difference…
Securing everyone's data and academic work is a top priority for our technology teams across Cornell. As we welcome new and returning students this fall semester, we invite you to help us in this mission by reviewing privacy safeguards and tips to avoid phishing scams, learning how to protect…
Simulations are used to train astronauts and health care workers, so why not faculty and staff faced with stressful decisions? New phishing simulations to be run quarterly by the Cornell IT Security Office have been designed to help faculty, staff, researchers, and other employees more easily…
As the deadline for filing your taxes approaches, scammers are hard at work phishing for your personal information and impersonating the IRS. Tax scams can take many forms. It's important to be knowledgeable so you can protect your personal information.
Why Cybersecurity Training?Protecting Cornell data, including that of faculty, staff, and students, is a shared responsibility. While extensive technical safeguards reduce our risk considerably, the university's best defense continues to be a well-informed community that knows how to recognize and…
The holidays are a great time to celebrate. Don't let criminals steal your good cheer. Be aware of scams that prey on your busy schedule and charitable giving. Protect yourself online to ensure a safe and happy holiday season.
Spot Phishing Emails
A common starting point for many scams is by…
National Cybersecurity Awareness Month is held every October to raise awareness and ensure that everyone has the resources they need to stay safer and more secure online. The Internet touches nearly every aspect of our daily lives. When we all take steps to protect our connected devices and data,…
Unfortunately, malicious attempts to exploit high-profile events, anniversaries of significant events, emergencies, tragedies, and even major political events, are not uncommon:
Learn how to protect yourself online and help guide others in the right direction. Stay #CyberAware and #BeCyberSmart. Your digital footprint matters.
Be sure to back up your data. Data stored on your devices can be lost, accidentally deleted, or maliciously attacked. Protect your important files, data, and research by making electronic copies and storing them safely. Have multiple backup plans in place to fully secure your work as appropriate…
These days, the Internet touches nearly every aspect of our daily lives. When we all take steps to secure our connected devices and data, we all benefit. When using a computer, phone, or tablet, think of the following:
Regardless of how fast your fingers fly on a keyboard or your phone, the best…
Cornell University proactively blocks Internet sites that pose a security threat to the university or the Cornell community. Websites are deemed a security threat when they host malicious software or scripts, or are used to try to steal Cornell login information or passwords.…