security.wsu.edu
annual-report | Security at WSU | Washington State University
https://security.wsu.edu/annual-report
Skip to main content. Password requirements & best practices.
security.wsu.edu
Phishing | Security at WSU | Washington State University
https://security.wsu.edu/phishing
Skip to main content. Phishing is an attempt to trick you into revealing private information. Emails, texts, or phone calls can “fish” for information by trying to lure you into giving passwords, credit card numbers, etc., to a malicious third party. Report suspicious emails and phishing scams to abuse@wsu.edu. How to recognize a phishing attempt. Legitimate companies do not ask for personal info via email or text. Messages may appear to be from organizations you do business with. Attn: Staff and Student:.
security.wsu.edu
FAQ | Security at WSU | Washington State University
https://security.wsu.edu/faq
Skip to main content. Over the past several months, a number of major, research-intensive universities across the country have been under cyber-attack. Unfortunately, Washington State University is among them. There is no evidence that personal, research, or student data has been exposed. WSU has been working with an external cyber security firm to investigate the activity, protect the data stored on our systems, and strengthen security measures within IT environments across the university. In order to f...
security.wsu.edu
Password Requirements & Best Practices | Security at WSU | Washington State University
https://security.wsu.edu/password-requirements-best-practices
Skip to main content. As a best practice, create strong passwords that do not match passwords you use anywhere else (e.g. your bank account, personal email, etc). Never share your password. Character Change Requirement for PW Resets. 3 characters must change. 150 Failures within 5 minutes. How to create a strong password that you can remember. Avoid names, places, family, pets, and dictionary words. Connect the first letters of a passphrase:. 1ibLn Tib5e = One if by land, two if by sea.
security.wsu.edu
News | Security at WSU | Washington State University
https://security.wsu.edu/news
Skip to main content. October Cyber Awareness News from Sasi Pillay. October 10, 2016. 2016 WSU #CyberAware Day Summit. And National Cyber Security Awareness Month. I am excited to share an event Information Technology Services (ITS) will be hosting on the Pullman campus October 12th in support of October being the National Cyber Security Awareness Month. University Centers -North Puget Sound WSU (Everett)(GWH-365 ). If you believe you may have already clicked on a malicious link or attachment in a phish...
bsyse.wsu.edu
Student Resources - Biological Systems Engineering | Engineering for Life
http://bsyse.wsu.edu/graduate-program/current-students
How to Find Us. 2016 News and Accomplishments. Bioenergy and Bioproducts Engineering. Land, Air, Water Resources and Environmental Engineering. Student Clubs and Chapters. Ahring, Birgitte K. Khot, Lav R. Sablani, Shyam S. Stöckle, Claudio O. Wu, Joan Q. Staff and Research Associates. Analytical Chemistry Service Center. Request to Hire a Temporary Employee. Setting up Your Computer. I Want to Give. I Want to Give. How to Find Us. 2016 News & Accomplishments. Bioenergy & Bioproducts Engineering. As a WSU...
security.wsu.edu
Policies and Guidelines | Security at WSU | Washington State University
https://security.wsu.edu/policies-and-guidelines
Skip to main content. Information Security Services is responsible for promoting a secure computing environment in which Washington State University can carry out its mission and accomplish its strategic goals, by overseeing information security policies, procedures, and practices for protecting core university data. Policies and Guidelines form the foundation of any security program. WSU Cloud Acceptable Use Matrix (PDF). WSU Cloud Computing Guideline (PDF). Password requirements & best practices.
security.wsu.edu
Malware | Security at WSU | Washington State University
https://security.wsu.edu/malware
Skip to main content. Any unprotected computer connected to the internet is likely to be infected within minutes. Malware infections put your personal data and everyone you’re connected to at risk. Protect yourself against malware. Keep your system up to date. Do not install untrusted software. Change of browser homepage/start page. Changed settings which cannot be changed back. Ending up at a strange site when using search. System firewall has been turned off. Increased network activity while not active.
SOCIAL ENGAGEMENT