Mount mug faded background

NOTE: Banner images should be placed in this first content block and should be at least 720px wide.

Strong passwords are key to protecting your personal information.  In addition to the suggestions below, please access the PASSWORD TIPS section of the the Mount's website for guidance on ensuring your password is not easily compromised.

1. Use strong passwords.

DO NOT:
- use the same password for multiple accounts
- use 123456 or qwerty or password
- use personally identifiable information, like your birthday or phone number
- keep a list of your passwords stored in computer file

DO:
- use a passphrase: https://www.eff.org/dice

2. Use a password manager
Password mangers allow you to use a unique password for each site without having to memorize them all.  You may want to check out;

- KeePassX
- 1Password
- LastPass

3. Turn on two-factor authentication
Some applications, like Gmail and iTunes, can be configured to require a combination of two different factors before you log in. This includes something you know, like a password, and something you have, like a cell phone. For example, you enter your Gmail password, and a text message is automatically sent to your phone with a unique 4-digit code that you must submit to complete the log in. Even if someone figured out your password, they would not be able to log in without having physical access to your phone.


Phishing (pronounced "fishing") is defined as "the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information, such as passwords and credit card numbers."

People who phish use emails, web forms, and viruses to:

1.  Trick you into revealing your password or other personal information
2.  Trick you into installing a virus

These criminals may be trying to commit:

1.  Fraud, such as in identity theft or credit card fraud
2.  Extortion, such as with ransomware
3.  Data theft, such as for selling personal information on the dark web
4.  Computer hacking, such accessing the Mount's or your personal computers

So, it is very important to know how to spot phishing:

- Phishing Red Flags
- Spear Phishing
- Phishing Email Examples
- Phishing Login Form Examples
- What to do if you are "Phished"

If you are unsure whether an email is phishing or legitimate, please ask the IT&S Help Desk at 902-457-6538, helpdesk@msvu.ca, or visit them on the lower level of EMF.

To help protect you from cyber-crime, the Mount's IT&S Department has created an online cybersecurity course available for students on Moodle and on Mount Training for faculty and staff.  Learn the common red flags of phishing emails, how to spot fake login forms, strategies to be cyber-safe, and to avoid having your computer become infected with ransomware (a type of malicious software designed to block access to a computer system until a sum of money is paid).

For more information on how to protect yourself from cyber threats, phishing and ransomware, please access the Mount's IT&S.