Information Security

For your protection, academic computer labs and faculty/staff workstations are equipped with anti-virus software. These systems will automatically check for viruses and alert the University ITS Help Desk as required.

Virus Hoaxes

If you receive electronic mail claiming to be a virus warning, please forward the message to helpdesk@stockton.edu. Please do not send it to the campus community. Information Technology Services will investigate and will notify the campus.

Email is an ideal tool for conveying information to millions of people. This information can be useful, irrelevant (spam emails) or have malicious purposes (phishing). Cybercriminals have become very crafty to lure people into clicking on an attachment, a link or giving up their personal information. Emails can look like legitimate messages coming from a trusted source, such as your bank, a friend or a family member. Always check with the source (by phone or other means) before taking any action that may put you or your accounts at risk.

Spam

Spam email is the equivalent of receiving junk mail from businesses promoting their products and services.

Phishing

This type of email attempts to steal your personal information information and use it for malicious purposes. Cybercriminals can use your information to access bank accounts, open new credit cards or assume your identity.

  • Spear phishing
    Spear Phishing is directed at specific group of people or companies. For example, cybercriminals can launch an attack on a business to get customers' information. Then assume the business identity to launch an attack against the customers, making the emails look authentic, thus increasing the attacker's probability of success.
     
  • Clone phishing
    This happens when a legitimate, and previously delivered, email containing an attachment or link has its content and recipient address(es) taken and used to create an almost identical or cloned email. The attachment or link within the email is replaced with a malicious version and then sent from an email address spoofed to appear to come from the original sender.
     
  • Whaling
    These type of phishing attacks are directed specifically at senior executives and other high profile targets within businesses. The email takes a more executive type of form such as a legal subpoena, customer complaint, or executive issue.
     

Spam and Phishing on Social Networks

Because of their popularity, social networks have become ideal sites for spam and phishing messages. The same rules apply as with suspicious emails.  Exercise a skeptical approach to receiving unsolicited email or when evaluating online content.

Go to On Guard Online to learn more about spam and phishing.

What to do to avoid being a Victim

  • Be aware of suspicious messages. You can be the most powerful weapon against Spam and Phishing
  • Keep your computer's operating system and antivirus up to date
  • Forward suspected phishing email to phishing@stockton.edu
  • Stockton employees, block spammers and phishers.
    • In Outlook (client version), right click on the suspicious email, select Junk and click on Block Sender.
    • In Outlook Web App (web version), right click on the email and click on Mark as Junk
  • Stockton students, learn how to block unwanted messages in Gmail.

This guideline applies to all students, staff, and faculty using their own (non university-owned) computer equipment on or off campus.

Information Technology Services is charged with providing for the computing and information communication needs of the university community.  As part of that charge, the division provides the technical services necessary to establish and maintain information, instructional delivery and communication systems that appropriately support the administrative, academic and auxiliary operations of the institution. Information Technology Services is here to support the use of a personally owned computer for connectivity to our resources. 

Information Technology Services can provide telephone support to assist our community members through connectivity failures by:

  • Assisting in the installation and configuration of connectivity software
  • Evaluating hardware/software issues that may be interfering with connectivity
  • Suggesting useful non-University resources

If your computer problem is beyond the scope of the Help Desk's ability to provide assistance, there are several options for you to consider:

  1. Check your warranty information, and consult with your computer's manufacturer or vendor. They will have the best information about your computer hardware, and they will be able to tell you what free or low cost repair services you may qualify for as part of your warranty.
  2. You may wish to engage a technician at a local computer repair shop.