So you’ve landed on an email that seems suspicious. The best thing to do is to forward the email to the ITS helpdesk however, it’s not your usual forwarding. Below are the steps on how to forward the email properly so the ITS helpdesk can properly verify the email. But first, let’s look at the […]
This is a tutorial to guide you through the steps of reporting spam and phishing emails to us.
Computer attacks occurs on a daily basis. The most common forms of these attacks are: Phishing: a malicious attempt to acquire sensitive information such as usernames, passwords or credit card details by impersonating a trustworthy entity in an electronic communication. Malware: short for “malicious software”, is software that, among other things, can cause data loss, be […]
IMPORTANT NOTE: The information on this page assumes a slightly higher level of familiarity with your system. If you are not comfortable attempting the steps on this page, please visit the Helpdesk with your computer. Malware removal on Windows Check your browser for plug-ins or extensions. If you see ads constantly popping up, or if […]
The reznet system has temporarily blocked your computer from accessing the internet because it detected that your computer attempted to open too many connections, too quickly. This block is in effect for 10 minutes and then you will be permitted to access the internet again. This is usually indicative of malware being present on a […]
Two types of email-based attacks are prevalent these days, and both are being executed on campus fairly regularly. One is called phishing, in which a malicious person attempts to have you provide them some secure information that only you know (your username & password, your bank account info, your SIN number, etc). The other is […]