Cybersecurity includes Phishing and Spam emails, Computer Viruses, Digital Citizenship and Netiquette. To learn more about each topic, click the links below to expand the menus.



PHISHING / CYBER SECURITY

Phishing

Definition: to try to obtain financial or other confidential information from Internet users, typically by sending an email-that looks a it if is from a legitimate organization, usually a financial institution, but contains a link to a fake Web site that replicates the real one.

In general, most entities (e.g. banks, health care organizations, academic institutions) will not initiate electronic communications that request your account number, social security number, credit card number, insurance ID, etc. Do not give out personal or sensitive information in electronic mail messages.


Please DO NOT forward emails you suspect as Phishing.

 Rather use the "Phish Alert Tool" in your Outlook ribbon. 

   


PASSWORDS

Choosing a Password

Creating a secure password is vital for successfully managing your life on the Internet.  

See the links below to help you create a secure and easy-to-remember password(s):

 
Keeping Your Computer Safe

Computer Virus, Malware, Adware, Spyware, Worms, Trojans...

Virus: is a program or piece of code that is loaded onto your computer without your knowledge and runs against your wishes.
Malware: software programs designed to damage or do other unwanted actions on a computer system
Adware: is free software that is supported by advertisements, such as toolbars that work in conjunction with your Web browser. Most are safe to use, but some can serve as spyware gathering information from your hard drive, the Web sites you visit, or your keystrokes. Be careful what adware you install on your computer. 
Spyware: is software that "spies" on your computer.  It can capture information like Web browsing habits, email messages, usernames and passwords and credit card information.
Worms: is similar to a virus by design and is considered to be a sub-class of a virus. Worms spread from computer to computer, but unlike a virus, it has the capability to travel without any human action.
Trojans: at first glance will appear to be useful software but will actually do damage once installed or run on your computer.  Those on the receiving end of a Trojan Horse are usually tricked into opening them because they appear to be receiving legitimate software or files from a legitimate source.

Do you really need antivirus software? (ZDNet.com - Yes!  A very good resource for all you wanted to know about the benefits of antivirus software and were afraid to ask. Just how dangerous is it out there?  You'd be surprised.  See the essential steps you need to take to keep your Windows PC safe.

Some recommended antivirus software:

How did my computer get infected?

  1. Your computer does not have antivirus software installed.
  2. Your antivirus software does not have the most up-to-date virus definitions.
  3. Your PC is behind in its Windows Updates.
  4. You clicked on a link or attachment in an email without questioning the source. If the email sender is unknown, delete immediately. Be suspicious of emails from friends - could be spam - always ask to be sure.  It is always best to delete suspect emails and have them sent again if necessary.
  5. The administrator password on your Windows PC is blank.
  6. You clicked on the flashing message that popped up on your computer telling you "Your computer is infected with viruses - click here to clean your computer" and you've unwittingly opened an executable file that might bring your PC to its knees.  Sometimes also clicking the "cancel" button will yield the same results.  Always try the "X" to close.  If it will not let you click the "X", close the program and/or shut off your PC.
  7. You clicked on a popup that looks like a Windows message or alert. Many of them look very convincing and when you click on them they take you to another website to try to get you to download software. You can check to see if it's a proper alert by right-clicking on the window.  If there is a menu that comes up saying "Add to Favorites" - you know it is a fake.
  8. You downloaded software from the Internet that was infected.  To check the validity of software downloads see: Norton Safe Web.
  9. You opened an infected file from an external drive.  Be sure to run virus scans on any flash or external drives.
  10. You did everything right and it still happened.  Unfortunately that is very true, however you can be prepared and practice safe computing.




UPDATES

Keep Your Computer Up-To-Date

Keeping your computer (Windows PC or Mac) current with updates for your operating system and software is essential to a healthy computer.  Both Windows PC's and Mac computers can be set to automatically update.

More topics associated with Cybersecurity:

Help Desk

Help Desk Contact Info

717-871-7777

Location: Boyer Building

Email: Help.Desk@millersville.edu

Classroom Hotline: 717-871-7280

After Hours D2L Help: 877-325-7778

Hours:
Call Center/Technical Assistance Center

  • Fall/Spring Semesters:
    • M-TH 8AM - 7PM EST, F 8AM - 5PM EST
  • Winter/Summer Sessions:
    • M-F 8AM - 4PM EST

Technical Operations 'Tech Ops' Contact Info 

Audio/Video/Lighting/Electronic Support for University Campus functions

717-871-7689

Location: SMC

Email: TechOps@millersville.edu


Sign up for the MU Alert System Emergency Notification
Download LiveSafe - mobile safety system for the entire University Community:  LiveSafe App
Search HelpDesk Resources