Search11 Results
- Knowledge Base
- Information Security
- Standards & Policies
- Knowledge Base
- Information Security
Pass phrases are easier to remember, easier to type, and more secure!
- Knowledge Base
- Information Security
A fake or "spoofed" website can look just like a company's real site. Look for these signs to spot a fake site.
- Knowledge Base
- Information Security
Phishing is a common online scam designed to trick you into disclosing your personal or financial information for the purpose of financial fraud or identity theft.
- Knowledge Base
- Information Security
Clicking a link or document in a malicious email can significantly affect TRU, beyond the risk it poses to the confidentiality of personal information.
- Knowledge Base
- Information Security
- Standards & Policies
Thompson Rivers University Policy Documents
- Knowledge Base
- Information Security
If you forget your password, some systems allow you to use shared secrets to gain access and reset your password.
- Knowledge Base
- Information Security
- Knowledge Base
- Information Security
- Standards & Policies
This standard establishes the process for creating and maintaining “Generic/Shared Accounts” for network and system access.
- Knowledge Base
- Information Security
Pharming, pronounced farming, is a means of directing you to a fraudulent web site without your knowledge. The primary objective is to convince you to enter confidential data.
- Knowledge Base
- Information Security
What is identity theft?
How identity thieves get your personal information?