Two-factor Authentication Two-factor authentication also referred to as multi-factor authentication, provides an additional layer of security when logging in to a website. Two-factor authentication is becoming the standard in cybersecurity. Google, Apple, and other services all have their two-factor authentication methods. In short, passwords are no longer sufficient in protecting our sensitive data; we’ve got…
Month: July 2020
Finding your Computer Name
Open a Command Prompt Go to the lower left corner of your desktop you will see 4 white squares Right Click a menu will pop up from the menu select “Command Prompt” A window will open on your desktop at the blinking cursor Type “Hostname” (without the quotes) then hit enter The computer name will…
Last Modified:
Copy Link
Reporting Phishing or Junk Emails
Outlook Web Access (Office365.fdu.edu) Click on the email that you would like to Mark as Junk or Mark as Phishing Click the down arrow next to the Junk button Click on the appropriate button to report the email (Junk, Phishing or Block) Once you report the email, a copy of the email is automatically sent…
Last Modified:
Copy Link