Security

Devices running Windows 8 or Windows 10 include a built-in antivirus product, Windows Defender.  If you are using an older version of Windows Microsoft provides a free antivirus product, Windows Security Essentials, which can be downloaded from their website.

You must have authorization to access PRISM, to obtain authorization you must complete a PRISM Authorization Form. This form is available from your campus Student Services Office.

  • Read the FERPA statement on the form.
  • Complete and sign the top section of the PRISM Authorization Form.
  • Return it to your campus Student Services Office.
  • You will receive an email with confirmation of authorization to use PRISM.
    Please Note: To log into PRISM use your campus network ID and password.

Here is a short article on some basic steps published by DoIT.

How to recognize phishing email messages, links, or phone calls

Phishing email messages, websites, and phone calls are designed to steal money. Cybercriminals can do this by installing malicious software on your computer or stealing personal information off of your computer. Cybercriminals also use social engineering to convince you to install malicious software or hand over your personal information under false pretenses. They might email you, call you on the phone, or convince you to download something off of a website.

What does a phishing email message look like?

Here is an example of what a phishing scam in an email message might look like:
phishing email

  • Spelling and bad grammar. Cybercriminals are not known for their grammar and spelling. Professional companies or organizations usually have a staff of copy editors that will not allow a mass email like this to go out to its users. If you notice mistakes in an email, it might be a scam. For more information, see Email and web scams: How to help protect yourself.
  • Beware of links in email. If you see a link in a suspicious email message, don't click on it. Rest your mouse (but don't click) on the link to see if the address matches the link that was typed in the message. In the example below the link reveals the real web address, as shown in the box with the yellow background. The string of cryptic numbers looks nothing like the company's web address.
    URL phishing
    Links might also lead you to .exe files. These kinds of file are known to spread malicious software.
  • Threats. Have you ever received a threat that your Hotmail account would be closed if you didn't respond to an email message? The email message shown above is an example of the same trick. Cybercriminals often use threats that your security has been compromised. For more information, see Watch out for fake alerts.
  • Spoofing popular websites or companies. Scam artists use graphics in email that appear to be connected to legitimate websites but actually take you to phony scam sites or legitimate-looking pop-up windows.
  • Cybercriminals also use web addresses that resemble the names of well-known companies but are slightly altered.
  • Alarmist messages and threats of account closures.
  • Promises of money for little or no effort.
  • Deals that sound too good to be true.
  • Requests to donate to a charitable organization after a disaster that has been in the news.

Adapted from these sites:

http://www.microsoft.com/security/online-privacy/phishing-symptoms.aspx and http://www.microsoft.com/security/online-privacy/phishing-scams.aspx

Other FAQs about phishing: http://www.microsoft.com/security/online-privacy/phishing-faq.aspx

Identity theft: How to recognize it and what to do about it

Published: June 11, 2012 by DoIT

It's your identity, and you can keep it safe. Learn how to avoid identity theft, recognize that it has occurred, and recover if your identity is stolen. Click on title.

[MakeUseOf Explains] Click the link below to view a document which describes the browser cache, and how to clear it.

http://www.makeuseof.com/tag/browser-cache-makeuseof-explains/

[MakeUseOf Explains] Click the first link below to view a web page which explains the differences between a Worm, a Trojan, and a Virus.

http://www.makeuseof.com/tag/difference-worm-trojan-virus-makeuseof-explains/

or

View video here.

First verify you are using the correct user name and password when attempting to log into your account. The standard user name convention for faculty and staff is "firstname.lastname" (e.g. john.smith). If you are still unable to log in, you should try resetting your account password. To do this, go to https://portal.uwex.uwc.edu/reset/, enter your User name, and answer two of the security questions you previously choose. If you answer the security questions correctly a page will display where you can select a new password.

If you have never used this utility, click on the link labeled "First time user?" Initially you will need to authenticate providing the personal information requested. If the information you entered matches your Human Resources file, you will be prompted to Select 3 to 5 security questions and answers. Once you have completed selecting and answering your security questions a page will display where you can select a new password. If you are still unable to log in with your account, please inform the Service Center by selecting one of the 3 options listed under the "Get Support" heading to the left of this FAQ.