The I.T. Service Desk is open Monday–Friday 7 a.m.–8 p.m. and Saturday 10 a.m.–4 p.m.
Scammers often utilize social media by creating fake accounts pretending to be popular brands, organizations, celebrities, or even your own friends to try and convince you to give them personal information and data. They can use this information to steal your money, including credit or debit card numbers, bank account numbers, usernames and passwords, etc.
One common tactic that these accounts use is exploiting real giveaways. When a real account starts a giveaway, scammers will create fake accounts and seek out people who entered to try to get their personal information by telling them that they won.
To identify fake accounts and avoid being scammed over social media, check the following criteria:
Here is an example of a real account that is being followed:
Whether you have a Windows or a Mac computer, you can set up your school email to be delivered to the mail program of your choice.
All Zoom recordings after July 31, 2021 are automatically stored in Kaltura.
Phone calls can be stressful for both the caller and the receiver. Understanding how to manage Cisco phones can make a big difference in comfort levels and can make it easier to effectively communicate over the phone.
If you encounter any issues with your Cisco phone, contact the I.T. Service Desk at (208) 496-1411 or through their Live Chat function for immediate assistance.
A quick call and service request can have a new Cisco phone at your desk in no time.
Today, Outlook provides more than just the sending and receiving of emails. It has a variety of tools that make managing emails easier. For example, there are Rules, Add-ons, and Templates. Unfortunately, there are people out there who use these great tools to worm their way in and steal your data.
Microsoft Outlook has a great system that looks for spam emails, but if you are still being bombarded by unwanted ads or your computer is acting slower than usual, it might be a good idea to check your Outlook Rules.
The following instructions will provide a step by step guidance on how to check Rules for lingering viruses.
Phishing scams are malicious emails claiming to be from a legitimate source. The cybercriminals sending these emails want your personal information (e.g. card numbers, Social Security numbers, birthday information, passwords, etc.) that can be used to access your bank accounts and other sensitive information.
Emailing is a necessity for most of us. With all the risks involved in owning and using an email account, here are some ways to keep yourself safe from email attacks.