Photo ID’s are issued in the EMF Library The Library staff print and renew the Mount ID Cards. Click here for up-to-date information about photo ID cards.
Campus Life – ITS
Defend yourself against fraud by changing your password regularly. Make your password difficult for malicious users to guess. Your password should be: A minimum of eight characters long. A longer password is usually more secure.…
To use the forgotten password feature of the password change tool: You need to have set up your challenge questions. You need your Mount username, Mount email address and Mount student/employee number. Set up…
Self-Service Password Reset Tool Self-Service Password Reset (SSPR) within Office 365 enables users to securely reset their University account password without contacting the IT&S Help Desk. This service is currently only available to students and…
Secure Your Device Protect Against Viruses and Malware For Mount office computers For personal devices and home computers Lock It When You Leave It You can do this manually using a key combination, for example…
Data Storage and Backup Knowing where your data is stored and also the backup and recovery options are very important for ensuring the safety and integrity of University data. While the information below is aimed…
Phishing Email Examples Phishing emails typically try to scare or rush you into clicking a malicious link, into opening a computer virus, or into supplying personal information by email.
Phishing Login Form Examples Example 1 Although this login page may look like the Mount’s Office 365 login page, you can see that: It does not use https, rather it uses http which is insecure…
Phishing What Is Phishing? Phishing is when a criminal uses emails, SMS text messages (smishing), web forms, and viruses to: Trick you into revealing your password or other personal information. Trick you into applying for…
Spear Phishing When a hacker tries to phish a specific individual, it is called “spear phishing”, targeted phishing. These spear phishing emails can be harder to detect than mass phishing emails. They can: Appear to…