results for "security"
Results 1-7 of 7
Results Per Page: 
LSU Recommendation: NEVER Give Your Personal Information, Password or Credentials to E-mail Messages Requesting It. It is Most Likely a Scam. LSU & LSU Departments / Affiliates Will NEVER ...
Article Id: 16680


A password is a common form of authentication and is often the only barrier between you and your personal information. There are several tools that attackers use to assist in guessing or cracking a password. By creating a complex password and keeping it confidential, you make it more difficult for hackers to gain unauthorized access to your information. Why do I need a Password? ...
Article Id: 16865

Most phishing scams can be avoided by sticking to these basic principles: 1. Treat ALL LINKS as if they are suspicious. (Links include Web Addresses & URLs) 2. Log in with your LSU PAWS ID at official lsu.edu...
Article Id: 17107

Report Phishing E-mails The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP team quickly and efficiently. The application will be available for all @lsu.edu mailboxes automatically without any user intervention. The application is implemented with the University's Office365...
Article Id: 19636

General Information LSU provides its faculty, staff, and students with an LSU E-mail account. It is powered by the Microsoft Office 365 cloud service and the web interface has been customized for LSU. Your e-mail address will be: [Your myLSU ID] @lsu.edu. The e-mail can be accessed using Outlook Web Access (OWA), Outlook desktop application, and other methods. The account also...
Article Id: 19913

When reporting a suspicious e-mail or a potential phishing attempt to ITS, please include the Message Header. The Message Header contains helpful information which can assist e-mail administrators in troubleshooting. Note: The LSU IT Security and Policy (ITSP) Team has deployed Cofense Reporter, an application that provides users the ability to report suspicious e-mails to the ITSP...
Article Id: 14922

Provide Search Feedback Logo
Search Google Logo