Updating...

Skip to main content
The University of Scranton
  • All
  • Knowledge Base
Sign In
Client Portal
  • Sign In
  • Search
  • Home
  • Knowledge Base
  • More Applications
    Skip to Knowledge Base content
    • Search Articles
    1. Knowledge Base
    2. Information Security

     Information Security

    Articles related to information and cyber security

    Articles (2)

    How do I recognize and report suspected phishing attempts?

    Learn what phishing is, how it works and how to protect yourself from phishing attempts.

    What is Microsoft ATP and why the weird addresses in my email?

    Learn about Microsoft Advanced Threat Protection (ATP) and how it protects you from malicious emails and attachments.
    Blank

    Popular Articles

    • Sign in to view more articles
    • Duo: How to Re-Enroll Your Account
    • Duo: Enroll In Duo Multifactor Authentication (MFA)
    • How do I recognize and report suspected phishing attempts?
    • What is third party access and how do I grant it?
    View All Popular Articles

    Recent Articles

    • What is Microsoft ATP and why the weird addresses in my email?
    • How do I recognize and report suspected phishing attempts?
    • What is third party access and how do I grant it?
    • Duo: Enroll In Duo Multifactor Authentication (MFA)
    • Duo: How to Re-Enroll Your Account
    View All Recent Articles

    Popular Tags

    No tags have been applied.
    View All Tags

    Technology Support Center | Alumni Memorial Hall | 570-941-HELP (4357)