Information Security for Students
SEAR the Phish!
Cybercriminals craft legitimate-looking email to trick you into divulging your personal information. To keep yourself from becoming a victim, remember to "SEAR the Phish".
|STOP||Don't panic and don’t be too quick to click on email links even if the message looks urgent and threatening.|
|EXAMINE||Look at the email closely. Does the message look suspicious, does the link look unusual, does the request make sense?|
|ASK||Question the sender (if you know him/her personally). Check with the ITS Help Desk (firstname.lastname@example.org) to determine if the email is legitimate or not.|
|REPORT||Notify ITS if you receive any UH-related phishing emails by forwarding it to email@example.com. Learn how to report a suspicious email at https://www.hawaii.edu/askus/898|
Learn more at https://hawaii.edu/infosec/phishing/
File Sharing on the University Network
Unauthorized downloading and distribution of copyrighted material (Unauthorized downloading and distribution of copyrighted material (songs, movies, software, games, etc.) is illegal and in violation of Federal Copyright Laws and may subject you to civil and criminal liabilities.
Find Legal sources of online content here.
The University of Hawaii investigates all copyright violation complaints.
The offending computer will be blocked from accessing the University of Hawaii Network.
Learn more at https://hawaii.edu/its/filesharing/
Protect your Account!
Your UH account can access more than e-mail. So its important to take precautions to ensure your account stays secure.
- Use a STRONG password
- Use a unique password for each site
- Don't share your password with anyone
- Secure your devices like your laptop, phone or tablet
Nothing posted online is really private, so think before you post!
Mobile Device Security
Mobile Devices are becoming apart of peoples everyday lives. Many of us use our mobile devices to view bank account information, pay bills, browse the internet, and social media. Our mobile devices can also be used to store sensitive information like photos, videos, emails, and text messages. It's important that we protect this information to prevent unauthorized users from accessing the information.
Learn more at https://www.hawaii.edu/infosec/mobiledevices/