LTU ALERT:

For Thursday 02/06/25, the campus will be closed until 12 noon today due to the severe weather. All classes scheduled after 12 noon will take place as scheduled. Students should check Canvas for details on classes.

Cybersecurity

Safe Computing

What is phishing?

Phishing:   The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Identify theft can be devastating to the victim and is difficult, costly, and time-consuming to fix.

How to identify a potentially dangerous email

There are many websites which can help explain phishing tactics and what you can do to protect yourself.  For more information, look at these sites:

To help the Lawrence Tech community recognize a legitimate email message, please remember:
  • Messages sent from Lawrence Tech IT Services will always be signed by name .
  • You will never be asked to send personal information in an email message.
    • Personal Information: passwords, social security number, name, email address, residential address, credit card number, mother’s maiden name, etc.
  • Any email message which indicates that you are over your email storage quota is almost always  a phishing attempt.
  • There are often grammatical or typographical errors. You may notice something just seems wrong with the grammar.
  • The return address is unknown to you. If you were able to see the “reply to” address, which was visible in some cases, you would have seen that if you had replied it was going to an unknown email address, and not an ltu.edu address.
  • Never click on any links in phishing emails.

KnowBe4

Protecting people and their information is very important to the LTU community. Unfortunately cybersecurity breaches have become very common and regardless of the technical safeguards taken, most of them originate through some common ploys at gaining confidential access.

LTU provides KnowBe4 training program to raise awareness for Faculty and Staff. This series of short educational videos covers topics such as Social Engineering techniques used to illegally gain access systems, Wi-Fi Security protecting Personally Identifiable Information (PII) and others. Some of the available topics will be mandatory for all employees; others will be specific to certain job types based on the functions they perform.

All employees will receive an email when training needs to be completed.

Common Social Engineering Red Flags

Usernames & Passwords

The same campus username will log you into Canvas, campus computers, laptops, and tablets.
Student accounts are created within 24 hours of registration.

Canvas/Network passwords can be reset online using our self-service password management tool.
Please click the link to change your password: myPassword

» Document Viewer

Use Your Cell Phone as a Document Camera in Zoom

  • What you will need to have and do
  • Download the mobile Zoom app (either App Store or Google Play)
  • Have your phone plugged in
  • Set up video stand phone holder

From Computer

Log in and start your Zoom session with participants

From Phone

  • Start the Zoom session on your phone app (suggest setting your phone to “Do not disturb” since your phone screen will be seen in Zoom)
  • Type in the Meeting ID and Join
  • Do not use phone audio option to avoid feedback
  • Select “share content” and “screen” to share your cell phone’s screen in your Zoom session
  • Select “start broadcast” from Zoom app. The home screen of your cell phone is now being shared with your participants.

To use your cell phone as a makeshift document camera

  • Open (swipe to switch apps) and select the camera app on your phone
  • Start in photo mode and aim the camera at whatever materials you would like to share
  • This is where you will have to position what you want to share to get the best view – but you will see ‘how you are doing’ in the main Zoom session.