Skip to main content
Information Security

Information Security

Information Security

Information Security Issues?

Call
337.475.5995

Submit a Helpdesk ticket
Contact InfoSec

The protection of information resources at McNeese State University is a high priority. The Information Security website is designed to educate the university community about technology policies and information security best practices, and equip students, faculty and staff with the tools needed to protect the information resources of the University, it's members and connected networks. McNeese State University is committed to implementing policies and encouraging best practices that do not impose on the University's established culture of openness, trust, and integrity.


Please read the Policies, Guidelines, and Laws Relating to Information Security.

Warning

McNeese will NEVER ask for account information via email. Messages about quotas, upgrades or maintenance are likely Phishing attempts. Read about Compromised Credentials.


Password Day 2016

World Password Day 2016 | 05.05

Anatomy of a password

Are you as clever as you think?

Data breaches make the news almost daily. If your passwords are easily crackable, your accounts may already be compromised. If you do not regularly change your passwords or use the same password for multiple accounts, you are at even greater risk. You (or others) can check if your credentials have appeared on password dump sites with minimal effort. Upgrading your password now is easy and can save you a lot of trouble later.

Follow these four steps to secure your passwords, the gateway to your digital life.

Step 1

Create strong passwords.

Ransomware Alert

Locky Ransomware Alert

Posted on February 25, 2016
Ransomware dubbed “Locky” is spreading via email, in the form of a Word file attached to e-mail messages. Locky email is translated to various languages and localized by region.
E-mails with this type of ransomware may look something like:

Locky instructions
Once the Word attachment is opened, users see scrambled content and are asked to enable macros. When/if macros are enabled, the malware spreads, and encrypts nearly all file formats as hash.locky files including any mounted USB sticks and network file shares.
Once encrypted, users receive the following:

Locky Invoice
Locky ransomware typically asks victims to pay between 0.5 and 2 Bitcoins ($208 – $800) for the decryption key.
The antivirus software available through McNeese, Sophos, may not provide full protection against all variants of this malware.

Pages