Roosevelt University in Chicago, Schaumburg and Online - Logo
  • Home
  • Information Technology Services

ITS News and Technology Tips

Be Safe This Tax Season

Feb 23, 2015

As the 2015 tax filing season begins, taxpayers should prepare for heightened risks and be vigilant to tax fraud. Attack Details – Phishing: Scam artists pose as legitimate entities – such as the Internal Revenue Service (IRS), other government agencies, … Continue reading

What Questions Do You Have Regarding Information Security?

Feb 18, 2015

In December, broadcast messages regarding safe file attachment practices and a method of assessing the safety of URLs were shared with the community. This information is also available at Future topics include: Data Privacy Day Using Junkmail in Outlook … Continue reading

Today is Data Privacy Day

Jan 28, 2015

Share with care and remember personal information is like money. Value it. Protect it. What you post can last a lifetime: before posting online think about how it might be perceived now and in the future and who might see … Continue reading

Junk Email

Jan 20, 2015

Tired of junk email in your Inbox? Use the Junk Email feature within Outlook to tag mail and send it to the Junk Email folder automatically. Tagging a message as junk will send future messages from that sender to this … Continue reading

Software Requests for Computer Labs

Dec 11, 2014

To ensure that the computers in the classrooms and labs meet the need of all faculty members in support of their teaching, we’re asking that you submit a list of any special software you need to have installed on the … Continue reading

Know Where You Are Going Before You Click

Dec 01, 2014

To protect yourself as you read email and research on the web, you need to know where links are going to take you, compared to where you expect to go. Links can be misleading. Certain websites included in phishing emails … Continue reading

Connect With Care

Oct 21, 2014

It is estimated that 45% of employees have received a phishing email. Phishing is the attempt to acquire sensitive information such as usernames, passwords, and credit card details by masquerading as a trustworthy entity in an electronic communication. When in … Continue reading

Search More Articles