Content (10)
The content of Zoom meetings can be captured by other means than AI bots. Some web services use screen recording tools or browser apps that allow individuals to capture the content of publicly available Zoom events. Cornell Zoom events have been found in online listings of such “webinar” offerings…
What Is the Form For?The form creates a service request with the Email Services team.
When deciding whether to activate AI tools to summarize or analyze Zoom meeting transcripts and cloud recordings, consider carefully whether the potential benefits of using AI Companion outweigh the security, privacy, and accuracy risks outlined on this page, or whether the tool might be…
Phishing and other kinds of fraudulent or deceptive outreach efforts are ramping up in terms of frequency and stealth at Cornell. So the IT Security Office is working to help the community learn to better identify and report suspicious email.
PhishAlarm will be retired in alignment with Resilient Cornell's fiscal goals on May 29, 2026. Cornell community members can either continue to use PhishAlarm until that date or start using the built-in reporting tools already found in Outlook or Gmail when flagging questionable messages.
Best practices for everyone (students, faculty, and staff): Although these are requirements for employees handling sensitive information, it is also good practice to configure all devices in this way for extra protection against loss or theft.Definition of mobile handheld devices: …
Learn how to protect yourself online and help guide others in the right direction. Stay #CyberAware and #BeCyberSmart. Your digital footprint matters.
Stay safe online at Cornell.Do your part. #BeCyberSmart. Avoid suspicious links and email attachments, and use Cornell IT services to help protect your personal information, connected devices, and university data. Remember to report any incidents to the IT Security Office.
University-Owned ComputersIf the university-owned computer is managed by a unit that’s signed a Certified Desktop agreement, your IT staff will deploy CrowdStrike.