Learn about avoiding email scams, protecting your devices and where to get to help if you've been hacked.
Learn to recognize a phishing attempt, what is a suspicious email and what to avoid.
Learn about Online Scams.
Not necessarily. Scammers can easily forge (or "spoof") any email address. For more information, read our article, "All about ‘spoofing:’ how scammers send fake emails that look real".
Report the theft and start a recovery plan at the Federal Trade Commission's website, https://identitytheft.gov/
UB offers a wide variety of Information Security Awareness Training >
Find instructions for disposing old equipment and cleaning off your computer before you recycle it.
Contact the UBIT Help Center.
Becoming familiar with how Facebook and other social media work is important. Here are some safeguards.
Invest in a laptop lock to physically secure it and you can purchase software such as LoJack so your laptop can be tracked and possibly recovered if stolen.
Read our Web Browser Hardening Recommendations.
If you are using a peer-to-peer (P2P) file-sharing program or have set up an ftp server, make sure that you are not "serving" copyright-protected materials to the world. If the University is notified by policing organizations such as the RIAA, MPAA, or their agents, you will be requested to appear at UB's Computer Discipline Office to discuss the complaint. Failure to appear could result in deactivation of your UBIT privileges. Learn more about the Digital Millienilum Copyright Act (DMCA).