Skip to main content

More in this section

Student IT Security

Don't Wait! Use These FREE Resources


Protect your computer and Cornell's network from viruses.
Install antivirus.


Laptop Recovery
Increase chances of finding your lost or stolen laptop.
Install FrontDoor Software.


Secure Wi-Fi
Keep everything you do online private.
No snoopers!
Use eduroam secure Wi-Fi.


NetID Password Protection
Prepare to reset your password easily if it's forgotten or stolen.

Set your security questions.


Mobile Security
Make sure your smartphone and tablet are also more secure.
Apply best practices to your mobile devices.

Practice Risk Prevention
and Internet Safety

Wherever you are and whatever device you're using (computer, tablet, smartphone, etc.), always practice risk prevention to minimize the chances of theft or compromise.‬

Whenever your computer is connected to the Internet, it is under constant attack by criminals seeking to steal information, send spam emails, distribute illicit material, and attack other computers. Always practice Internet safety to avoid malicious software, internet fraud, and invasions of your privacy.

Get Help for IT
Security Problems

NetID password compromise - what to do if you suspect your NetID password has been stolen:

  1. Change your password immediately. Contact the IT Service Desk if you can't change your password.
  2. Report the incident immediately to

Computer compromise - what to do if you suspect your system has been hacked or downloaded a virus:

  1. Turn off Wi-Fi and/or unplug your ethernet (disconnect from the network).
  2. Contact the IT Service Desk for help (phone 607 255-5500 or visit 119 Computing Communications Center).

Help Keep Cornell Secure


See Securing Your Computer to learn about setting strong passwords, keeping software up to date, and more. By keeping your computer secure, you are helping to protect all of Cornell's systems, including our networks and other people's computers and devices.

All campus systems used to conduct university business must follow baseline IT security requirements outlined in Securing Your Computer.


Type your security question:

Browse all Security articles