Search9 Results

You received an email titled "Your phish report has been reviewed" from the NDUS SOC at This is a legit email to provide feedback when you use the Report as Phishing button. If you are unsure, please contact UND Tech Support to report your concerns.
Need to report a phishing email? These steps will show you how to use the Phish Notify button within your O365 email account.
Phishing email messages, websites, and phone calls are designed to steal money. Cyber-criminals can do this by installing malicious software on your computer or stealing personal information from your computer. More often than not, phishing messages follow a standard framework that can be easy to spot if you know what to look for. Here's a look at the anatomy of a typical phishing email
There are other types of phishing attacks that attackers use. Here is information on four that have been used at this university.
There has been an increase in phishing, fraud, and scam emails. Currently, this has taken the form of fraudulent job postings. Fake job postings come as unsolicited emails sent directly to your account or through an online job listing sites. We advise students, faculty, and staff to avoid being scam victims by following these guidelines:
Here are some helpful tips to protect yourself and sensitive data during the Holidays.
University of North Dakota (UND) community travelers should limit the amount of sensitive information stored on or accessible to any device being used and taken on a trip. Travelers should avoid contact with the University of North Dakota network in general, specifically when traveling to high-risk countries (see U.S. State Department's Alerts and Warnings).
Before traveling out of the country, remember to contact UND’s Export Control Manager (Michael Sadler; to ensure
This information assists you in the best practices to protect University systems and yourself in your day-to-day life.
In this increasingly wireless world, the steps households should take in terms of cybersecurity have changed. Most homes now run networks of devices linked to the internet, including computers, gaming systems, TVs, tablets, and smartphones that access wireless networks. Thus, having the right tools in place will instill confidence that your family members can use the internet safely and securely for personal and work-related endeavors.