Security

Spam

Spam are unsolicited, usually mass-produced messages. ÆßÐDzʿª½± emails are protected with Microsoft EOP, which also blocks the viruses from email attachments. All emails from the College are duly signed, that we never ask for your password, provide a link to change your password, etc. Spam goes to your Junk E-mail folder. In Outlook, right-clicking, ‘junk…

Ransomware

There is a relatively new type of virus called ransomware which as it name implies ask for a ransom after performing a malicious action, which is often to encrypt every file it can access from your account (e.g. the network drives). You typically get infected executing an email attachment, or an infected encrypted file. If…

Multi-Factor Authentication (MFA)

Multi-factor Authentication (MFA) provides another verification method in addition to your password, for example a token or a fingerprint. You may have seen this when some sites send you a text message to validate who you are.

IT Security overview

If you witness a security breach, or suspect your account or information have been compromised, DO NOT DELAY! Contact IT Support immediately. Here are pointers to information to better protect yourself: Training by D-Zone CyberAwareness Phishing including examples Ransowmare Below is a sample of some the security measures deployed in the College Anti-virus Anti-spam Firewalls…

I got phished!

This document  explains what happens when your account gets hacked due to phishing or ransomware, and what corrective steps you should take.

Email spoofing

E-mail spoofing is a term used to describe fraudulent e-mail activity in which the sender address and other parts of the e-mail header are altered to appear as though the e-mail originated from a different source (from Wikipedia). If you have received undelivered emails warnings regarding email you never sent, it is possible you are the…

Cybersecurity Awareness Platform

ÆßÐDzʿª½± is using CIRA D-Zone Cyberaware Platform (BeauceronSecurity.com) for the purposes of cybersecurity awareness training and phishing simulation campaigns. Login to MyÆßÐDzʿª½± (Omnivox) with your ÆßÐDzʿª½± username and password Click on the D-Zone CyberAwareness under Computer HelpDesk Services If you see the login page, then login in with your ÆßÐDzʿª½± email address Then you…

Choosing a good password

A weak password can easily be guessed by a third party, which could compromise security of our network and services. For example, your login name, phone number, spouse name, or any word in a dictionary, are not good passwords. A good password should: be at least eight characters long, use a combination of letters, digits…

Anti-virus and Malware protection

All PCs have an anti-virus software called McAfee to protect against the execution or installation of malware. To ensure it is running properly, locate the McAfee icon in the System Tray, click About and check that the DAT created on is no more than a few days old. On Office machines, McAfee integrates with Outlook…