Updating...

Skip to main content
The University of Scranton (opens in a new tab)
  • All
  • Knowledge Base
Sign In
Client Portal
  • Sign In
  • Search
  • Home
  • Knowledge Base
  • More Applications
    Skip to Knowledge Base content
    • Search Articles
    1. Knowledge Base
    2. Information Security

     Information Security

    Articles related to information and cyber security

    Articles (2)

    How do I recognize and report suspected phishing attempts?

    Learn what phishing is, how it works and how to protect yourself from phishing attempts.

    What is Microsoft ATP and why the weird addresses in my email?

    Learn about Microsoft Advanced Threat Protection (ATP) and how it protects you from malicious emails and attachments.
    Blank

    Popular Articles

    • How do I migrate from Duo to Microsoft MFA?
    • How do I add SMS Text Messages as a backup option for Microsoft MFA?
    • I'm a new user. How do I setup Microsoft MFA?
    • Duo: Enroll In Duo Multifactor Authentication (MFA)
    • Sign in to view more articles
    View All Popular Articles

    Recent Articles

    • How do I record a classroom lecture?
    • How do I enable Panopto in my course?
    • How do I locate a technology enriched classroom or space?
    • I'm a new user. How do I setup Microsoft MFA?
    • How do I migrate from Duo to Microsoft MFA?
    View All Recent Articles

    Popular Tags

    No tags have been applied.
    View All Tags

    Technology Support Center | Alumni Memorial Hall | 570-941-HELP (4357)