How to keep your devices up to date

  • Keep up with patching: Regularly update the operating systems, software, and applications on all of your devices (computers, tablets, and phones). Software developers release patches and updates to address known vulnerabilities. Ignoring these updates can leave your devices exposed to potential cyber threats.
  • Make it easier with automatic updates: Enable automatic updates whenever possible.

How to spot phishing emails

See it so you do not click on it. 

The signs can be a bit subtle at times, so the first thing is to slow down, take a few seconds and look over the email and think if it looks legit. Here are some tips on how to spot a phish email and not take the bait! 

Think about what you see: 

How MFA makes your account more secure

It is worth noting that hackers are resilient.  While MFA does improve your security, a tactic that has started becoming more common is something known as an MFA fatigue attack (or MFA bombing).  This is when a hacker repeatedly tries to log in with stolen credentials until the victim approves one of the requests. If you run into this situation (either with your kent.edu account, or any personal account), do not approve unknown requests and change your password immediately.

This fellowship/residency will invite artists of national and international reputations to interact with KSU students, staff, and the broader community. 

Subscribe to