Skip to main content

Cornell University

Security

Content (56)

For over a decade, Tim Bradish has helped shield and strengthen Cornell services and systems against attack. In a spotlight story on the Human Resources (HR) home page, the associate chief information security officer attributed his team’s success to their interest in working with each other and…
AI meeting assistants or “bots” can be used for monitoring, summarizing, and recording virtual meetings. They are powerful tools for the purposes of accessibility and convenience but should also be used with caution. Whenever AI is involved, you should know how its use could impact your privacy and…
Many in the Cornell community have reported receiving fraudulent emails from PayPal. The emails may look like this example from the Phish Bowl.
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.September's Agenda includes:News from the Front - BillSecure Connect Update - Dan VillantiOpen ForumThe IT Security SIG…
Cornell has implemented Duo’s Verified Push for university faculty and employees.Verified Push was piloted by CIT staff and IT Service Group directors. It has also been in use at Weill Cornell Medicine and other major institutions with no adverse impact, becoming the new minimum standard for…
National Cybersecurity Awareness Month has come to an end, but the mission remains. Scammers don’t take a break, and neither can our community afford to forget important cybersecurity tips and tools. You can help Secure Our World in so many ways! 1. Share links the safe way in SharePoint…
Whether you’re using Box, SharePoint, or Microsoft Teams, collaborating on a document with coworkers is often as simple as sharing a link. However, this convenience can have steep cybersecurity consequences.  
Artificial intelligence is a tool with the potential to do great good in the world. Perhaps you’ve already benefited from it, using it to analyze data or solve a problem. But like any tool used irresponsibly, or in the wrong hands, artificial intelligence can do harm. If not used safely, it can…
The service offerings listed below are for the storage and retrieval of keys for whole disk encryption on CIT-managed devices.BitLockerBitLocker is a Windows feature that encrypts the data on your hard drive using BitLocker Whole Disk Encryption to keep the contents safe from unauthorized access.…
Thanks to technology, your personal and financial information are accessible to you from anywhere that the internet is available. This is convenient, but it also comes with risk. If all you need to access your account is “hello123,” then it will be easy for anyone else with an interest in your…
Since the PhishAlarm feature was introduced earlier this year, more than 6,000 potential threats have been reported. This number is only expected to rise as generative AI is making it easier than ever for hackers to automate their scams and make their attempts look less suspicious. The more…
It's National Cybersecurity Month and that means it's time to dust off the tips and tools that protect the Cornell community.It can be tempting to hit "snooze" on that update alert on your phone, browser, or computer. But letting your device or software update right away could mean the difference…
The monthly IT Security SIG meeting brings together Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics. For October, the IT Security SIG team invites you to join them for a trivia gameshow. Come test your technology, current…
On Wednesday, September 18, 2024, at 12:10 p.m., the Cornell Office of Emergency Management will conduct a test of the campus emergency notification system.Expect to see tests on voice and text messaging, Cornell-managed desktop and laptop computers located on campus, CUView digital signage, and…
Securing everyone's data and academic work is a top priority for our technology teams across Cornell. As we welcome new and returning students this fall semester, we invite you to help us in this mission by reviewing privacy safeguards and tips to avoid phishing scams, learning how to protect…
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting.September's Agenda includes:
The Identity Management team has begun a critical project to migrate the university’s on-premises Oracle Enterprise Directory system to a new production environment hosted by Optimal IDM. This project is part of the Cornell Safe Access initiative and will be an essential part of enhancing Cornell’s…
As Cornell continues to recover from the July 19, 2024 worldwide Windows outage, a small number of Windows computers may still be affected by a software update that produces a blue screen and error message. The number is decreasing as IT staff across the campus continue helping the community…
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting. July’s Agenda includes:
Cornell security liaisons, technical support providers, and those interested in learning more about security-related topics are invited to join the monthly IT Security SIG meeting. June's Agenda includes:

At Cornell we value your privacy. To view
our university's privacy practices, including
information use and third parties, visit University Privacy.