Security
Common Questions
Accounts & Passwords
My account was compromised. What do I do?
Contact IT immediately by submitting a ticket or calling the helpdesk. Do not attempt to recover it yourself — we need to act quickly to limit exposure. Change any passwords you share across other accounts as well.
What are the password requirements?
Refer to the Information Security Policies for password requirements and general cybersecurity guidelines.
Two-Factor Authentication (2FA)
What is 2FA and why do I need it?
Two-Factor Authentication (2FA) — also called Multi-Factor Authentication (MFA) — is the single-best defense for protecting your online accounts. In addition to your password, it requires you to confirm your identity using a trusted device (typically your mobile phone). Refer to the Enabling 2FA guide for setup instructions.
What 2FA method should I use?
An authenticator app (such as Microsoft Authenticator or Google Authenticator) is preferred over SMS, as it is more secure and works without cell service.
Phishing
How do I recognize a phishing email?
Common red flags: urgent or threatening language, unexpected attachments or links, a sender address that doesn’t match the display name, and requests for credentials or payment. Refer to the Combating Phishing Attacks guide for a full breakdown.
I received a suspicious email. What should I do?
Do not click any links or download attachments. Report it as phishing/spam in your email client. If you are unsure, contact IT before taking any action.