Cybersecurity Month Build A Better Password Banner
Phish TankPhish Tank
A collection of phishing scams that have attempted to bait the Auburn community.
Phish TankIn page navigation
Changing Your Auburn PasswordUser Lock
Tips and information on changing your Auburn password.
Auburn PasswordIn page navigation
2-Factor AuthenticationDUO
Auburn has implemented DUO as high-security login authentication.
2-Factor Authentication (DUO)In page navigation
LastPassLastPass Logo
Stores links to websites, auto-generates secure passwords and auto-fills password forms.
LassPass InformationIn page navigation
Enables Auburn employees to comply with protecting restricted data.
SpirionIn page navigation
Cybsecurity Awareness TipsSecurity
Auburn Cybersecurity Awareness Month information
Cybersecurity Awareness TipsIn page navigation
Mobile Device SecurityMobile Device
Auburn University's mobile device security requirements.
Mobile Device SecurityIn page navigation
Phishing is an attempt to acquire personal information masquerading as a trustworthy entity.
PhishingIn page navigation
Cybersecurity TrainingSANS
Each day more and more cyber threats are committed against institutions of higher education.
SANS Securing the HumanIn page navigation
Removal Tips, Tools, and Information.
Spyware/MalwareIn page navigation
Virus ProtectionVirus Protection
Everyone at Auburn University is expected to take precautions to protect their computers against viruses.
Virus ProtectionIn page navigation
VPN ClientVPN Client
A VPN provides a secure two-way communication tunnel to the Auburn University network.
VPN ClientIn page navigation
Case In PointCase In Point
Lessons for the pro-active manager
Case In PointIn page navigation
Project CleanupDelete
Improving security and minimizing risk through proper data management
Project CleanupIn page navigation
External ResourcesWeb Resources
External Cybersecurity resources
External ResourcesIn page navigation
Minimum Server StandardsServers
Minimum standards for server administration and security.
Minimum Server StandardsIn page navigation
Minimum Endpoint StandardsLaptop
Minimum standards for endpoint administration and security.
Minimum Endpoint StandardsIn page navigation
Minimum App StandardsApplication Code
Minimum standards for application development and security.
Minimum App StandardsIn page navigation
Data Storage MatrixStorage Device
Standards for data storage by classifiction
Data Storage MatrixIn page navigation
103  or    844-0888 with questions
William Miaoulis

As the United States and the world deal with the ongoing pandemic, the FBI’s national security and criminal investigative work continues. There are threats you should be aware of so you can take steps to protect yourself.  

  • Children who are home from school and spending more time online may be at increased risk for exploitation.
  • Anyone can be targeted by hackers and scammers.
  • Protecting civil rights and investigating hate crimes remain a high priority for the FBI.

Use the resources on the FBI page to help keep yourself and your family safe from these and other threats.

Published: 4/23/2020 8:57 AM
# Comments: 0
William Miaoulis

Cybercriminals are not taking a Covid-19 break and they are accustomed to working from home.   Our obligation to protect data does not go away.  Together we can minimize the exposure to Auburn Data by practicing good Cybersecurity standards.  Here are some policies and tips:

  • Turn off your equipment and sanitize the keyboard and mouse by using a disinfectant wipe or a soft, linen-free cloth dipped in isopropyl alcohol. Rub the cloth or wipe on the top and sides of each key and then clean the surface and bottom of the keyboard thoroughly. Use a new disinfectant wipe or cloth to clean the mouse.
  • Do not store any non-public Auburn University information on personal devices or personal storage locations.    If necessary the machine should be encrypted.
  • Be extra cautious of emails that contain links as many on-site protections are not available from off-campus.
  • All remote access to the Auburn network will continue to require the use of OIT approved two factor authentication; this includes but is not limited to VPNs, Remote Desktop Programs, Secure Shell (SSH) and Virtual Desktop Infrastructure access.   
  • It is preferred that individuals utilize Auburn Owned Equipment, contact your department to determine if you can take equipment (Desktops, Monitors, etc.) home and do it today. 
  • If you must use personal equipment, you should:
    • Ensure you are operating supported operating systems (No Windows 7, etc.) and that it is up to date.
    • Utilize up to date anti-virus equipment
  • Do not allow family members to have access to the Auburn Network by logging out of the Auburn network when completing your work
  • Sanitize your phone:
    • If you have them, use a disinfectant wipe on your phone. (Lysol, Clorox, etc.).  Unplug all cables and turn off your phone prior to cleaning.  (Older phones are more susceptible to scratching, but the risk is to high not to clean)
    • Do not use your phone while eating.
    • Apple recently updated their language on their website on how you can clean their products.   "Using a 70 percent isopropyl alcohol wipe or Clorox Disinfecting Wipes, you may gently wipe the hard, nonporous surfaces of your Apple product, such as the display, keyboard, or other exterior surfaces. Don't use bleach. Avoid getting moisture in any opening, and don't submerge your Apple product in any cleaning agents. Don't use on fabric or leather surfaces," Apple said.
    • Your iPhone has a fingerprint-resistant oleophobic—oil repellent—coating. Cleaning products and abrasive materials will diminish the coating and might scratch your iPhone. (Do it anyway)


Published: 3/16/2020 7:49 AM
# Comments: 0
William Miaoulis

Scammers are pretending to be government employees. Scammers will try to scare you and trick you into giving them your personal information and money. They may threaten you or your family and may demand immediate payment to avoid arrest or other legal action.


1. Hang up!

2. DO NOT give them money or personal

3. Report the scam at OIG.SSA.GOV!

cell phone image

What to look out for

image of SS card

The call or email says there is a problem with your Social Security Number or account.

image of a credit card

Someone asking you to pay a fine or debt with retail gift cards, wire transfers, pre-paid debit cards, internet currency, or by mailing cash.

image of a cell phone

Scammers pretend they’re from Social Security or another government agency. Caller ID or documents sent by email may look official but they are not.

caution symbol

Callers threaten you with arrest or other legal action.

Social Security may call you in 
some situations but will never:

  • Threaten you
  • Suspend your Social Security Number
  • Demand immediate payment from you
  • Require payment by cash, gift card, pre-paid debit card, or wire transfer
  • Ask for gift card numbers over the phone or to wire or mail cash


Protect yourself, friends and family!

  • If you receive a questionable call, hang up and report it at
  • Don’t be embarrassed to report financial loss or sharing information
  • Learn more at
  • Share this information with others


Published: 1/27/2020 1:28 PM
# Comments: 0
1 - 3Next
Retrieving Data
Retrieving Data