Technology Services
- Cybersecurity and Privacy
Abnormal AI
Email-based attacks are becoming harder to detect, so we’re introducing Abnormal Security, a platform designed to better protect students, faculty, and staff from scams and malicious messages.
Cybersecurity Tips for Traveling
View precautionary measures you can take to lower your risk of being a target while traveling.
File-Sharing
Sharing copyrighted files is illegal and can cause major issues.
Login - Usernames and Passwords
How do I log in to eCampus? Username Lookup and Password Management
Multifactor Authentication (MFA)
The use of MFA enhances the University’s protection against hackers. It reduces the risk of compromised accounts by more than fifty percent. Using MFA also secures faculty research and may decrease the frequency of required password changes.
Password Best Practices
Your online safety is important, and your password is one of the most important ways to keep yourself safe. Here’s our guide to creating a password to help you keep your information secure.
Password Management Tool
The Adelphi Password Management Tool (PMT) is used to change or reset your password.
Patches and Updates
Installing patches and updates will help you to be better defend against cyber threats.
Phishing
Avoid becoming a phishing victim by staying informed and following the tips provided to you by Adelphi University's Office of Information Technology.
Report Phishing
Avoid becoming a phishing victim by staying informed and following the tips provided and knowing what to look for.
Saving Your Work
You should save all of your files to either Google Drive, or your Network drives. These files are saved securely and automatically backed up.
Secure Communication
Adelphi's Information Technology's tips for keep your identity safe online. Online shopping, email security, browser settings, windows updates and wireless connections all covered.
Social Media Safety
Don’t expose your activities and personal info on social networking sites.
Spearphishing
Spearphishing is a highly targeted form of phishing, which is an email that is made to appear to come from a friend, colleague or business you are familiar with.
Spyware
Spyware is software that collects your personal information. Learn best practices to prevent threats.
Theft and Loss
Don’t leave your belongings unattended. Phones, tablets, and laptops are easy targets of thieves and can also be accidentally lost in public spaces.
Third Party Review
The Third Party Review, also known as the Vendor Risk Assessment, is the process of assessing the risk associated with Third Party (vendor managed) services that store or process university information.
Viruses and Ransomware
Viruses, worms, trojans and ransomware—know what to look for and how to prevent infection.