Security Training

silhouette of a man on laptop. blue in color, cyber threat icons present.

Strengthening the cybersecurity of ǿմý is everyone’s concern, and requires fuller knowledge and improved efforts from all to make it happen.

To better inform the community, foster best practices in protecting data and confidential information and safeguard the interests of the university and its constituents, the Information Security Office presents the following materials—courtesy of the SANS Institute—intended to be reviewed by all community members on a quarterly basis.

As a major research institution, ǿմý handles a lot of sensitive information. Learn the right methods to access, process, transfer, archive and destroy data.

Download the strategy sheet here.

Social engineering attacks try to trick you into giving up confidential information. Find the best defenses to protect yourself.

Download the strategy sheet here.

Know the red flags that should tell you when to seek help for a hack attack.

Download the strategy sheet here.

Trojan horses, worms and other malware can infect anyone’s computer. Discover the best ways to stop it.

Download the strategy sheet here.

Modern smartphones are open to attacks just like desktop computers. Strengthen your mobile security with these simple tips.

Download the strategy sheet here.

There are some easy but important steps to protect your privacy on Facebook, Twitter and other social networks. This module presents simple and effective steps each user can implement now.

Download the strategy sheet here.

Cybercriminals can obtain your personal information and use it to customize targeted attacks against you or your co-workers. This module shows you how to be vigilant for attacks specifically made for you.

Download the strategy sheet here.

Passwords are the key to all of your information. Make them strong and keep them safe from everyone.

Download the strategy sheet here.

Know the signs of, and how to protect against, “phishing attacks”—a specific kind of social engineering threat.

Download the strategy sheet here.

Web surfing carries risks for all users. Arm yourself with best practices for safe searching.

Download the strategy sheet here.

ǿմý maintains practices, processes and procedures to ensure safe and secure credit card transactions.

Download strategy sheet one here.

Download strategy sheet two here.