Jun 20, 2018
Phishing and Other Fraudulent Email Practices
Information about Phishing and other forms of fraudulent email, what to do to avoid becoming a victim, and what to do if you have fallen victim.
Information about Phishing and other forms of fraudulent email, what to do to avoid becoming a victim, and what to do if you have fallen victim.
If you have been granted access to a server at Lafayette, you’ll need to use SSH to connect. For security reasons, we use SSH public keys for authentication…
A minor distraction is all it takes for a laptop or other valuable items to vanish. Keep these tips in mind when you’re out and about with your laptop…
ITS equips all College-owned computers with a managed version of endpoint protection software. ThreatDown EDR is an advanced antimalware program that provides…