Skip to main content
Apply

Information Technology

Open Main MenuClose Main Menu

Being aware of cyber security is just as important as remembering to lock your front door at night. Locking the front door is obvious – because you can see the physical door and the neighborhood; you tend to be suspicious of noises or lights or shadows. Locking up all the “doors” in your cyber environment is just as important. Intruders can break into your computer and devices and steal more than those who break into your house. The doors that are online, or at each website where you sign in, can have weaknesses in the ‘door’ strength that are not as obvious to us. We cannot see them readily as we do a physical door.

Below are some tips about what to look for – finding the doors that need locking – and recommendations on what kinds of locks (authentication methods) to keep your life secure. In addition, we will point out aspects of the cyber neighborhood where you need to be extra cautious to be sure you are not leaving your cyber doors open, unlocked, or giving thieves the keys to your important valuables – your data and your identity.

 

FAQ

  • How do I report a Suspicious, Fraudulent, or Spam e-mail?
    • You can report a suspicious or unsolicited e-mail in Office 365 (web interface or desktop application.) Microsoft uses this information to stop other e-mails and block links in existing e-mails.

    • If you are reporting the e-mail in Outlook on the web, click the ‘Report’ button and click ‘Report Phishing’.

    • If you are reporting the e-mail in the Outlook desktop application, make sure you have the Report Message add-in applied to your account. Select the e-mail you would like to report, click Report Message, and select the category you would like to report the message as.

      • To apply the Report Message add-in, click the Get Add-Ins button on the tool bar, then search for Report Message. Click Add and Continue. After the process of applying the add-in is complete, the Report Message button should appear on the right-hand side of the ribbon.

    • You can report a Suspicious or Fraudulent e-mail to the Information Security Services (ISS) Group by taking one of these actions:

    • You can report a Spam e-mail to to the Information Security Services (ISS) Group by taking one of these actions:

    • You can report an e-mail to the IT Helpdesk by composing a new e-mail message addressed to helpdesk@okstate.edu and dragging the suspicious or unsolicited e-mail to the new e-mail message; this method will allow the suspicious e-mail to be added as an attachment in the new mail item. You may also forward the suspicious e-mail to helpdesk@okstate.edu.

    •  
  • How do I Report a Suspicious Phone Call or Text Message?

    You can report a phone call or text message to the IT Helpdesk by composing a new e-mail message addressed to helpdesk@okstate.edu and attaching the suspicious or unsolicited text message or voicemail to the new e-mail message.

  • I am interested in receiving more risk and awareness training, how do I request more training?

    You can request Risk & Awareness Training by taking on of these actions:

    • Visiting the Security Risk and Awareness Training request form.

    • Start a support ticket by using this link: Request Help

      • Provide the following information in the Issue Field:

        • A detailed description of the training you are requesting and how you would like the training delivered (in-person, virtually, etc.)

 

Back To Top
SVG directory not found.
MENUCLOSE