Open navigation

Cybersecurity Awareness

Cybersecurity Awareness 

Higher Education has seen a sharp increase in cyber-attacks. Cybercriminals are increasingly trying to exploit human error to start their attacks on institutions. 

Information Technology Services at LSU Shreveport have put in play various software and tools in place to help detect and prevent attacks. However, ITS is unable to stop, for example, an employee buying gift cards for their 'supervisor'. 

For LSUS to be secure, it will take effort from everyone to stay Cybersecurity Aware.

What ITS Does to Protect You 

  • Multiple layers of email scanning. We scan for known malicious senders, malicious content, and known malicious patterns in emails.
  • Block access to websites. Known and suspected malicious webpages are blocked from access.
  • Malware scanning and prevention. If malware does get on a computer, we have multiple products in place to stop it from installing or taking any action. 
  • Regular Security Updates. We have an automated update schedule to ensure devices are as secure as possible. 
  • Multi Factor Authentication. We have implemented MFA to provide an additional layer of security for your accounts. A malicious criminal may get access to your password but not physically have your 2nd layer of authentication, your phone, and will be unable to get into your account.

What ITS Needs from You 

  • Treat business info as you would your personal info. You would not just randomly share your Social Security Number with a random person. Think twice about what you are sharing and to who. 
  • Passphrases not passwords. Passphrases are immensely better than words. The effortless way to do this is to take four random objects and put them together. For example, PencilMouseLightNotepad passphrase is not only easier to remember but more secure than a password like Qp3ro! You can add in numbers or special characters as needed. 
  • Update your stuff! LSUS ITS regularly updates LSUS devices but it cannot update personal devices. Applications and devices receive regular updates that should be applied as they could have vulnerabilities that need to be patched. Keep your applications, mobile devices, and computers as up to date as possible to close those vulnerabilities and potential pathways into LSUS. 
  • Be always aware! It is easy to click through emails opening anything and everything. Whatever you are doing, do it with care and caution. 

Potential Threats 

  • Phishing. A social engineering attack designed to trick the user into revealing sensitive information. Often phishing imitates a supervisor in an email or a login interface in a website. 
  • Malware. Malicious software that is secretly installed onto your computer. These are often embedded in Microsoft Word or Excel documents. Be aware and suspicious of documents from unexpected or unknown sources. 
  • Scareware or scary ads. Malicious software or ads displayed on your screen. Often these say your computer is infected and ask you to call them to resolve the issue. From here they try to extort money or information. 

Simple Tips 

  • Keep Devices Up to Date. While ITS updates LSUS devices. We cannot update your devices. Applications, computers, and phones should be updated as often as possible. 
  • Be Skeptical. Emails, especially ones with attachments from unknown or known sources, and are unsolicited or unexpected, should be treated with caution. Give the person who sent it a call and ask if they did indeed send it. 
  • Let ITS Know! ITS catches hundreds to thousands of malicious attempts a day and unfortunately a couple can slip through. If you suspect anything give us a call or put in a ticket. We will be very thankful! 
  • Trust Yourself. We have all run into it. Looked at something that just feels wrong. Trust your instincts! If it is too good to be true or just not right, do not open it or click it. Verify it is legitimate from the sender and let inform ITS. 

Reporting Suspicious Items 

You can report a suspected email by clicking the "Report Message" card at the top of an email. 


This triggers a series of actions that lets ITS quickly investigate and take any needed action on that email. You are the line of defense. 

If you suspect anything else, please inform ITS by emailing us at 

Important Cybersecurity Articles

Passphrases not Passwords : LSUS IT Helpdesk

Social Engineering Attacks : LSUS IT Helpdesk 

What do I do if I am a Victim of an Attack? : LSUS IT Helpdesk