The campus will remain closed until 12 noon Thursday, 02/13/25. Students should log into Canvas for specific class information from their instructors. Please contact event organizers for information on specific activities. Normal operations will resume at 12pm on Thursday.
Home » eHelp » Cybersecurity » Safe Computing
Using computers is a useful and necessary activity, but it can also involve risks to your computer and your personal information. Safe computing practices are a combination of computer software and security settings. To keep your computer safe use up to date antivirus, use the Internet safely, protect your data by using secure connections, and keep your computer and information safe by using strong passwords and controlling access to your computer.
Trouble logging in?
Contact the Help Desk at 248-204-2330 .
Trouble using the databases?
Contact the Library at 248-204-3000 or refdesk@ltu.edu
Microsoft System Center Endpoint Protection
All University laptops and desktops have Microsoft System Center Endpoint Protection (SCEP) anti-virus software installed. SCEP runs anti-virus scans and updates virus definitions on each system automatically.
Users with Lawrence Tech laptops or desktops do not need to do anything to configure or manage SCEP software.
If you have other questions about SCEP, please contact the Lawrence Tech Computer Help Desk by phone at 248.204.2330 or by email at helpdesk@ltu.edu .
When managing wireless connections at home, the qualities that make the internet accessible to you also make it accessible to everyone else. Be smart and secure your network to protect your privacy so that only those you allow can access it.
There are two basic steps to securing your home network: (1) keep your devices up to date and (2) secure your wireless router. For specific instructions, see the documentation from your internet service provider or the manufacturer of your device.
One of the most important ways to secure your data and protect your personal information is to know how to create and use strong passwords. Using strong passwords and changing them regularly can help keep you safe from attackers who try to access your accounts by guessing or cracking your passwords. A strong password is difficult to guess, has 8 or more characters, isn’t a word in the dictionary (regardless of language), and includes numbers and special characters.
How to create strong passwords
If you need help creating a strong password, here are some suggestions:
Remember to guard your identity and data by following these practices:
Are you using one of the ten most popular passwords?
Phishing: The act of sending an e-mail to a user falsely claiming to be an established legitimate enterprise in an attempt to scam the user into surrendering private information that will be used for identity theft. Identify theft can be devastating to the victim and is difficult, costly, and time-consuming to fix.
How to identify a potentially dangerous email
There are many websites which can help explain phishing tactics and what you can do to protect yourself. For more information, look at these sites:
Use Your Cell Phone as a Document Camera in Zoom
From Computer
Log in and start your Zoom session with participants
From Phone
To use your cell phone as a makeshift document camera