Know Your Responsibilities: Fordham’s Technology
Do you have questions about using technology at Fordham University? The IT Policies, Procedures, Guidelines repository may have some answers.…
Do you have questions about using technology at Fordham University? The IT Policies, Procedures, Guidelines repository may have some answers.…
Criminal cyber activity evolves at an alarming rate. A person involved with cybercrime continually devises new and increasingly sophisticated methods…
Imagine your computer suddenly freezes up and a message flashes onto the screen, demanding payment of thousands of dollars in…
October is National Cyber Security Awareness Month, which is a national annual campaign to raise awareness about the importance of…
Protect Your Identity Identity theft: It’s a serious threat that’s on the mind of most Americans, thanks to companies such…
Did you know a simple phishing scam can cost people money, their jobs, and their reputation? A short short story…
By now, you’re familiar with the routine for multi-factor authentication (MFA) at Fordham: You login to a Fordham system such…
It’s not if a cyber attack occurs at Fordham University. It’s when. But that’s not only true for Fordham. It’s…
Highlights from Fordham IT’s 2016 Annual Report are featured in this video. Links to additional information about the highlights can…
“Turn on two-factor authentication, whenever possible.” That’s the advice given in a recent NY Times article for anyone who takes…