• Pulse Secure for Windows
    Set up and install Pulse Secure for your Windows computer, which enables you to connect and disconnect to Fordham University's virtual private network (VPN).

    Pulse Secure for Windows

    Categories: , Tags:
  • Pulse Secure for Macs
    Set up and install Pulse Secure for your Mac computer, which enables you to connect and disconnect to Fordham University's virtual private network (VPN).

    Pulse Secure for Macs

    Categories: , Tags:
  • How to Set Up Multi-Factor Authentication
    This video demonstrates how to set up multi-factor authentication and enroll your devices in Duo Mobile. Multi-factor authentication, or MFA, verifies your identity before connecting to Fordham’s systems.

    How to Set Up Multi-Factor Authentication

  • Welcome to the ProofPoint Playlist – your go-to resource for cybersecurity insights and best practices! Dive into a curated collection of videos designed to arm you with the knowledge needed to defend against evolving threats.

    Proofpoint Playlist

  • Report Suspicious Emails with Cofense Reporter
    Learn how to report suspicious emails with Cofense reporter found on your Gmail account.

    Report Suspicious Emails with Cofense Reporter

  • Proofpoint Part 5: Targeted Access Protection
    In this installment of the Proofpoint series, we dissect the innovative features and strategies implemented within Targeted Access Protection.

    Proofpoint Part 5: Targeted Access Protection

    Categories: , Tags:
  • Proofpoint Part 4: Accessing the Web Console
    In this segment, we guide users through the intuitive interface and essential functionalities available via the Web Console.

    Proofpoint Part 4: Accessing the Web Console

    Categories: , Tags:
  • Proofpoint Part 3: View and Editing Lists
    Join us as we empower you to fine-tune your email protection measures with Proofpoint, ensuring robust defense against malicious threats and unauthorized communication.

    Proofpoint Part 3: View and Editing Lists

    Categories: , Tags:
  • Proofpoint Part 2: Viewing Quarantined Messages
    In this segment, we delve into the Quarantined Messages Viewer interface, providing insights on identifying and handling potentially harmful messages effectively.

    Proofpoint Part 2: Viewing Quarantined Messages

    Categories: , Tags:
  • Proofpoint Part 1: Basic Overview
    In this introductory segment, we explore how the quarantine summary email provides a concise snapshot of potentially malicious or suspicious messages that have been captured by Proofpoint's security filters.

    Proofpoint Part 1: Basic Overview

    Categories: , Tags:
  • Uninstall Bitdefender from a Mac
    In this tutorial, we will show how to uninstall Bitdefender Antivirus for Mac in just a few steps. Open Finder → Applications → Bitdefender folder → Bitdefender Uninstaller.

    Uninstall Bitdefender from a Mac

  • Uninstall Bitdefender from Windows 10
    Join us as we walk you through the simple steps required to uninstall Bitdefender, ensuring a smooth transition and optimal system performance.

    Uninstall Bitdefender from Windows 10