Learn how to get the most out of Sheridanâs classroom technology by attending a podium training session. Youâll learn about the tools you have available to support your curriculum
Phishing & Display Name Spoofing
A common tactic employed by cyber criminals when they go on email phishing expeditions is paper-thick – where they impersonate someone you know or a source that you trust.
No Hacking Skills Required
Leaving your computer screen unlocked when you're away from your desk not only puts the security of your personal data at risk but also that of the college. See 9784596242 for tips on locking your screen.