Vex the Cybervillains

Stay ahead of the cybercriminals with 4 basic safe computing practices you can immediately put into practice. Learn what they are and why they are effective in protecting your accounts and personal information. 

Please register here to receive the Zoom meeting information.

Vex the Cybervillains

Stay ahead of the cybercriminals with 4 basic safe computing practices you can immediately put into practice. Learn what they are and why they are effective in protecting your accounts and personal information. 

Please register here to receive the Zoom meeting information.

Vex the Cybervillains

Stay ahead of the cybercriminals with 4 basic safe computing practices you can immediately put into practice. Learn what they are and why they are effective in protecting your accounts and personal information. 

Please register here to receive the Zoom meeting information.

Don’t Feed the Phish!

As they say, there are plenty of phish in the sea. Identifying common red flags in an email will help you quickly identify when you should proverbially swipe left. This session will help you understand how cybercriminals design convincing email messages intended to deceive you and why phishing is the most common cyberattack method. Gain confidence in spotting suspicious emails and learn how reporting protects yourself and the university. We will also cover what to expect with the new simulated phishing training initiatives. 

Don’t Feed the Phish!

As they say, there are plenty of phish in the sea. Identifying common red flags in an email will help you quickly identify when you should proverbially swipe left. This session will help you understand how cybercriminals design convincing email messages intended to deceive you and why phishing is the most common cyberattack method. Gain confidence in spotting suspicious emails and learn how reporting protects yourself and the university. We will also cover what to expect with the new simulated phishing training initiatives. 

Don’t Feed the Phish!

As they say, there are plenty of phish in the sea. Identifying common red flags in an email will help you quickly identify when you should proverbially swipe left. This session will help you understand how cybercriminals design convincing email messages intended to deceive you and why phishing is the most common cyberattack method. Gain confidence in spotting suspicious emails and learn how reporting protects yourself and the university. We will also cover what to expect with the new simulated phishing training initiatives. 

Processing the Unimaginable: Art and Memory with Peter Newland

Vietnam veteran and book artist Peter Newland will share his work with students in an interactive session in the Archives & Special Collections. Newland served in the Republic of Vietnam with the 4th Headquarters Transportation Command in 1970.  He was stationed first at Camp Davies in Saigon, and later at Long Binh. He received his basic training at Fort Lewis and advanced training at Fort Eustice, Virginia. He is a recipient of the Army’s Bronze Star Medal and was honorably discharged as a Specialist Fight Class in 1971.