General
-
How To Avoid Being Phished
How to avoid being phished: Do NOT click links, open attachments, or fill out forms in suspicious emails. Instead, you can type in the URL to the company’s website or search for it. …
-
Student Employee Supervisors
All Student Employee Supervisors: Please submit a Formstack form for any student employee who will continue working after the end of classes on 4/21/2023 as well as any new student employee working the…
-
Capstone Film Props and Furniture
We need your help to make our next movie! Below are items we need for our upcoming Capstone film, Patterns. If you or someone you know would be willing to donate or let…
-
Common Characteristics of Phishing Emails
Here are some common practices for hackers’ phishing emails: Have a sense of urgency. This makes you react quickly, reducing your time to think and realize the scam. Ask you to change your…
-
Office of Admissions Staff Update
The Office of Admissions extends their congratulations to Susanne Watson on her new position at American Specialty Insurance. While she will be greatly missed, we are happy for her new opportunity to grow…
-
Capstone Film Props and Furniture
Below are items we need for our upcoming Capstone film, Patterns. If you or someone you know would be willing to donate or let us borrow some of these items, please contact our…
-
How to Identify Phishing Emails
Here are some best practices for identifying phishing emails: Be suspicious of emails that ask for your personal information. Check the sender’s email address. Is it exactly the same as the company’s email…
-
Chapel Speakers for This Week
Today’s chapel speaker is Dr. Luke Fetters, who specializes in intercultural studies and missions. He was the founding director of Huntington University’s Institute for TESOL Studies in 2009. In 2019, he was named…
-
RichLyn Resource of the Month – Nexis-Uni Database
One of this month’s featured library research databases is Nexis-Uni. Nexis-Uni features more than 15,000 news, business and legal sources, including U.S. Supreme Court decisions dating back to 1790. Great for political science,…
-
What Are the Consequences of Phishing Attacks?
What are the consequences of phishing attacks? Suppose a malicious link or attachment is opened, and malware is downloaded onto your computer. In that case, the malware cannot only take control of your…