From setting up your email to securing your devices, the Helpdesk ensures you’re never left figuring things out alone.
The username format is derived from the following convention:
Initial Password: DemonsMMDDYY (example: Demons120184)
After first login, change your password and set your recovery options through Password Management to easily reset passwords in the future.
Password Complexity Requirements:
Need help with academic records in myNSU?
Reach out to the Registrar’s Office:
Alost, Alumni, Bienvenu, FACS, Field House, Fine Arts, Fournet, HHP, Infirmary, Kyser, Morrison, New Fine Arts, Prather Coliseum, Roy, Russell, Student Union, TEC, Varnado, Watson, Williamson, WRAC
Moodle is NSU’s official learning platform for online classes. Note: NSU does not support the Moodle mobile app. Please use a web browser or the Open LMS app.
Add an extra layer of security to your myNSU account.
To set up multi-factor authentication on your myNSU account you will need at least one of the following:
LockDown Browser helps protect the integrity of online exams in Moodle.
Stay alert to phishing, ransomware, spyware, viruses, and pop-ups. If you think your device has been compromised:
📞 Call the Helpdesk at 318-357-6696.
🛡 Free Protection Tools:
Phishing is a deceptive technique utilized by criminals to distribute fraudulent emails that impersonate legitimate student organizations, university employees and/or departments, or even familiar contacts. These malicious individuals commonly use ordinary-seeming messages, such as account verification or password resets prompts, with the intention of gaining access to the users account and personal information.
How to recognize phishing attempts:
Pop-up Windows are unwanted windows that unexpectedly appear while browsing the internet and can contain malicious or deceptive content. The primary aim is to deceive users into clicking, leading to the installation of viruses, involvement in phishing scams, or other malicious activities.
Ransomware is a type of malicious software (malware) aimed at denying access to a computer system or network until a ransom is paid. The software is disseminated through phishing emails, malicious attachments, or compromised website.
Spyware usually exist in two variants: malicious software and tracking software. Malicious software can significantly degrade the computers performance and functionality whereas tracking software has the capability of logging a user’s keystrokes to transmit personal information to external parties via the internet.
Microsoft Windows:
Apple macOS:
Note: Chromebooks are not recommended for coursework
Print from your own laptop or device—no drivers needed!
Supported file types: Word, Excel, PowerPoint, PDF, XPS
Must be present in the lab to release prints.