• Enter your full EMAIL ADDRESS (use @ebnet.org at the end) and click OK
    • If this is the first time using Password Manger you must set up your security questions.  
    • At the HOME screen, click ‘Forgot My Password’
    • Enter the security code shown on the screen and click NEXT.  If you cannot read the image on the screen, you may click the ‘get a new image button’ to generate a new one.
    • Answer your security questions.  
    • Enter a new password.  The password must be at least 8 characters in length and something you have not used in the past year.  Click NEXT


    Password Manager user guide - Click HERE
    Click Password Manager to access the program
    Password Manager  


    Beware of phishing emails.
    Phishing is a form of fraud in which the attacker tries to learn information such as login credentials or account information by masquerading as a reputable entity or person in email, IM or other communication channels. Typically a victim receives a message that appears to have been sent by a known contact or organization. An attachment or links in the message may install malware on the user’s device or direct them to a malicious website set up to trick them into divulging personal and financial information, such as passwords, account IDs or credit card details. Phishing is popular with cyber criminals, as it is far easier to trick someone into clicking a malicious link in a seemingly legitimate email than trying to break through a computer’s defenses. 

    Take a moment to stop and consider whether or not an email that requests your personal information or network credentials is from a legitimate source. If you are not sure, ask before you proceed. Often, but not always, phishing emails contain poor grammar and misspelled words. Just as you would not open a door before being sure of who was on the other side, always be wary of unfamiliar email requests or links. 


    You Control What You Choose to Click
    Most end user threats are targeted specifically in hopes that you will click on a harmful link, attachment, picture, video or icon in an email or web page, including social media applications

    What you can do
    Your job is to be aware, be alert and diligent. Always look for the signs that external entities are trying to gain access to your PC and your network.