[ skip to content ]

There are specific rules for using University computers and the University network. Each and every user should make sure that they are aware of the rules and regulations. For further information please review this page.

Safe Email Practices
There are some simple practices that would help prevent one from falling victim to phishing scams and nefarious spam emails.

  1. Beware of 'Scare Tactic' mail informing you of account revalidation processes or quota limits. if you are not sure contact customer service directly and not via the reply option.
  2. Never click on unknown email links.
  3. Be Wary of email attachments. (Possibly scan all attachments before opening them)
  4. Don't get trapped by enticing 'Parcel delivery', 'Prize Winnings' , 'Purchase Order' or 'Work Opportunity' email notifications
  5. Always pay attention to the 'Reply To' address on emails that purport to be from a known sender.
  6. Never respond to offensive or spam emails.
  7. "NEVER" respond with personal identifiable information such as UserID's, Passwords, DOB, SSN, Address, Password Recovery Information.

Keep Computers and Information Safe

Protect Your Identity and Account Access: Don't Save Passwords
Most operating system features are available to make site and user access easier. The 'Save Password' option is one of those that allow users to gain access to their commonly used websites without re-entering user credentials. It is a nifty feature that many people use to save time. However, utilizing this feature is similar to leaving the house keys at the door when entering your home – it’s simply a bad idea because it makes access easier for EVERYONE, not just you. To avoid unintentional access to user email, school grades, financial information and other personal records, OCCS advocates the following best practices:

  • Clear your current password cache for stored passwords
  • Decline requests to store passwords for future use
  • Activate an idle time lock-out that will require a password to unlock your computer after a set amount of time with no activity. This will minimize the risk of an unauthorized person using an active session while the authorized user is away.

There are many resources on the Internet. Here are links to tools and sites that will help you analyze risks, take preventative measures, and protect your environment.

Computer Security Advice and Procedures

Computer Security Classes
Several sessions can be addressed in a one hour meeting format. You may request an awareness session by contacting Doug Streit at 757.683.5424.