Content (8)
When deciding whether to activate AI tools to summarize or analyze Zoom meeting transcripts and cloud recordings, consider carefully whether the potential benefits of using AI Companion outweigh the security, privacy, and accuracy risks outlined on this page, or whether the tool might be…
Phishing and other kinds of fraudulent or deceptive outreach efforts are ramping up in terms of frequency and stealth at Cornell. So the IT Security Office is working to help the community learn to better identify and report suspicious email.
For years, Cornell community members have continually helped strengthen the layers of security protecting the university's digital resources by forwarding suspicious email messages to the IT Security Office. To make it even easier for customers to notify us of potential threats, we are introducing…
Best practices for everyone (students, faculty, and staff): Although these are requirements for employees handling sensitive information, it is also good practice to configure all devices in this way for extra protection against loss or theft.Definition of mobile handheld devices: …
Learn how to protect yourself online and help guide others in the right direction. Stay #CyberAware and #BeCyberSmart. Your digital footprint matters.
Stay safe online at Cornell.Do your part. #BeCyberSmart. Avoid suspicious links and email attachments, and use Cornell IT services to help protect your personal information, connected devices, and university data. Remember to report any incidents to the IT Security Office.
University-Owned ComputersIf the university-owned computer is managed by a unit that’s signed a Certified Desktop agreement, your IT staff will deploy CrowdStrike.