Learn how to get the most out of Sheridan’s classroom technology by attending a podium training session. You’ll learn about the tools you have available to support your curriculum
Phishing & Display Name Spoofing
A common tactic employed by cyber criminals when they go on email phishing expeditions is display name spoofing – where they impersonate someone you know or a source that you trust.
No Hacking Skills Required
Leaving your computer screen unlocked when you're away from your desk not only puts the security of your personal data at risk but also that of the college. See Lock It or Lose It for tips on locking your screen.