it.troy.edu logo
Search TROY IT


Search Helpdesk
Quick Links
Information for:
Jump to Main Content
Safe-Connect Logout
Safety Alert System Notice
  • About
    Offices & Hours Announcements Awards & Recognition IT Update (Newsletter) Insights IT Summit IT Employee Area
  • Services
    Classroom Technology Computer Labs Conference Rooms Cyber Security ERP Support (Colleague/Datatel)
    Document Imaging E-mail (Microsoft 365) Flex Classes Support Internet/Networking Software Support
    Technology Quotes Telecommunications Training Video Conferencing/Webinar Website Design & Management
  • Students
    Student IT Homepage 1098-T Consent/Information Canvas Canvas Student Resources Classroom Technology Computer Labs
    E-mail E-mail Password Reset Emergency Alert System Information
    (SOS)
    Frequently Asked Questions Internet Access
    LiveText Student Security Student Software Technology Policies TROY IT Orientation
  • Employees
    Employees IT Homepage New Employee Enrollment
    Process (HR)
    New Employee IT Checklist Find Your Employee
    (Colleague) ID Number
    International Travel Requirements
    Cell Phone Request/Deduction Form Request E-mail Account Request Colleague Account Request Document Imaging Account
    Request VPN Account Reset Your E-mail Password Remote Productivity Tools
  • Policies
    Technology Policies Homepage Generative AI Copyright Information Data Governance Data Reporting
    E-mail Policy Family Education Rights &
    Privacy Act (FERPA)
    Information Technology Usage Policy International Travel Requirements
    Security Policy Technology Standardization Guidelines Website Disclaimer World Wide Web Policy
  • IT logo
  • Security
    Security Homepage Account Access and Recovery Mandatory Security Training Emergency Information (SOS)
    Request Guest Network Access Phishing E-mail Messages Admin Systems Security Access
    Authorization Process
    Security Policy Screen Locking Standard Quarterly IT Security Award Winners
  • Projects
    Project Archives
  • Help
    Faculty/Staff Directory Search IT Offices/Hours Helpdesk Knowledgebase Helpdesk LogMeIn Rescue University Police Help Directory Cleaning Computers and Electronics for All Users
  • troy.edu
  • Open Search
OUCH! Security Awareness Newsletter
Security Menu
  • Home
  • Take Action
    • Report a Vulnerability
    • Report a Security Incident
    • Report a Stolen Item
    • Report a Phishing Message
    • Change Password
    • Report Abuse of Electronic Resources
  • Education & Guides
    • [External] E-mail Tagging
    • Recent phishing attempts received by University students and employees
    • Best Practices for Securing Your Desktop
    • Learn about copyright, DMCA and University Policies
    • Best Practices for Reducing Spam
    • Use Password Managers
    • OUCH! Security Awareness Newsletter
  • Password Management
  • Physical Security
  • Theft of Computer Equipment
  • Policies & Procedures
    • Account Access and Recovery
    • Alabama Breach Notification Act of 2018
    • Admin Systems Security Access Authorization Process
    • Copyright Information
    • E-mail Policy
    • Information Technology Usage Policy
    • International Travel Requirements
    • World Wide Web Policy
    • Technology Policies
    • Technology Standardization Guidelines
  • Additional Resources
    • Contact Information Technology
    • Contact University Police
    • Information Technology Website
    • Information Technology Policy
    • University Police
    • Emergency/SOS
  • Quarterly IT Security Award

OUCH! Security Awareness Newsletter

  • How Cybercriminals Exploit Your Emotions (May 2025)
  • Account Takeovers: Emotional Predators (April 2025)
  • Beware of Deepfakes: A New Age of Deception (March 2025)
  • Sweet Talk and Empty Wallet: Romance Fueled Investment Scams (February 2025)
  • Smart Home Devices: Lock Them Down Before Cyber Criminals Do (January 2025)
  • Unveiling the Shadows: How Cyber Criminals Steal Your Passwords (December 2024)
  • Don’t Let Cybercriminals Swipe Your Savings: Lock Down Your Financial Accounts! (November 2024)
  • Download Danger: How to Outwit Malicious Mobile Apps (October 2024)
  • Phantom Voices: Defend Against Voice Cloning Attacks (September 2024)
  • Guard Your Heart (and Wallet) Against Romance Scams (August 2024)
  • Text Messaging Attacks: A Smishing Saga (July 2024)
  • Going on Vacation? Simple Steps to Make it Cybersecure (June 2024)
  • Top Three Ways Cyber Attackers Target You (May 2024)
  • Start A Career in Cybersecurity (April 2024)
  • Messaging Do’s and Don’ts (March 2024)
  • Identity Theft: Preventing, Detecting, and Responding (February 2024)
  • QR Codes (January 2024)
  • The Power of the Passphrase (December 2023)
  • The Power of Updating (October 2023)
  • Online Security for Kids (September 2023)
  • Stop Those Phone Call Scams (July 2023)
  • Securing Your Financial Accounts (June 2023)
  • Artificial Intelligence: What to Know (May 2023)
  • Scareware: A Story (April 2023)
  • Digital Spring Cleaning in 7 Simple Steps (March 2023)
  • Do I Need Security Software? (February 2023)
  • Biometrics – Making Security Simple (January 2023)
  • Disposing of Your Mobile Device (December 2022)
  • Browsers (November 2022)
  • Got Backups? (September 2022)
  • Charity & Disaster Scams (August 2022)
  • Phishing Attacks Are Getting Trickier (July 2022)
  • Securely Gaming Online (June 2022)
  • Top Three Social Media Scams (April 2022)
  • Learn a New Survival Skill: Spotting Deepfakes (March 2022)
  • Anyone Can Start a Career in Cybersecurity (February 2022)
  • Spot and Stop Messaging Attacks (January 2022)
  • Top Cybersecurity Tips for Vacations (December 2021)
  • Shopping Online Securely (November 2021)
  • Avoid The Most Common Email Mistakes (October 2021)
  • One Simple Step to Securing Your Accounts (September 2021)
  • Securely Using the Cloud (August 2021)
  • Securing Your Mobile Devices (July 2021)
  • Securely Using Mobile Apps (June 2021)
  • Vishing - Phone Call Attacks and Scams (May 2021)
  • Privacy - Protecting Your Digital Footprint (April 2021)
  • Identity Theft - Protecting Yourself (March 2021)
  • I'm Hacked. Now What? (February 2021)
  • Securing Wi-Fi at Home (January 2021)
  • Securing the Generation Gap (December 2020)
  • Social Engineering Attacks (November 2020)
  • Fake News (October 2020)
  • Online Security for Kids (September 2020)
  • Virtual Conferencing Safely and Securely (August 2020)
  • Ransomware (July 2020)
  • Creating a Cyber Secure Home (June 2020)
  • The Power of Updating (May 2020)
  • Password Managers (April 2020)
  • Digital Spring Cleaning (March 2020)
  • Social Media Privacy (February 2020)
  • Digital Inheritance ( January 2020)
  • Messaging/Smishing Attacks (December 2019)
  • Shopping Online Securely (November 2019)
  • Four Simple Steps to Staying Secure (October 2019)
  • Scamming You Though Social Media (September 2019)
  • Got Backups? (August 2019)
  • Virtual Private Networks (July 2019)
  • Dark Web (June 2019)
  • A Career in Cybersecurity (May 2019)
  • Making Passwords Simple (April 2019)
  • Disposing of Your Mobile Device (March 2019)
  • Personalized Scams (February 2019)
  • Search Yourself Online (January 2019)
  • Yes, You Are A Target (December 2018)
  • Am I Hacked? (November 2018)
  • Email Oops, and How To Avoid Them (October 2018)
  • Password Managers (September 2017)
  • Securely Using Mobile Apps (March 2017)
Troy University Horizontal Logo
  • Troy, Alabama 36082
  • 1-800-414-5756
  • Questions?
  • Submit Feedback
  • Student Complaints
  • Student Disability Services
  • Accessibility Statement
  • Privacy Statement
  • Read Our Disclaimer
  • Accreditation Statement
  • Sites and Services Index

© 2025 Troy University

Scroll to Top of Current Page