SlideShare une entreprise Scribd logo
1  sur  16
Télécharger pour lire hors ligne
Wilmington University
Online Cyber Security Training
This training will cover 12 simple tips that WilmU
faculty and staff members should know and actively
practice.
Family Educational Rights and Privacy Act
(FERPA)
The purpose of FERPA is to
protect educational records.
This includes:
 A student’s personal
information
 Enrollment records
 Grades
 Schedules
 Financial aid documents
 Payment account
information.

Here’s a few ways you can help keep educational records
safe under FERPA Compliance:
1. If you step away from your computer, lock it! You
work on important things - make sure they stay safe
and secure
How to Quickly Lock
Your Computer
If you’re stepping away from
your computer for a
moment, you may want to
lock your computer. Locking
your PC is an easy way to
hide any sensitive
information that is displayed
on your screen, such as a
student record in CAMS.

Use this keyboard
shortcut to instantly lock
your computer: press the
Windows logo key + L.
2. If you print a student transcript to a copier in
a public area, retrieve it immediately
3. Be sure to destroy sensitive documents. Place
them in the shred bins or a shredder - never
throw away in a regular trashcan anything with
an educational record.
4. Always remember to logout of Blackboard, especially if you
are on a public computer. Otherwise someone could access
the student grades in your course’s grade center.
5. Never leave graded assignments in a stack for
students to pick up by sorting through the papers of
all students. The best place to distribute student
grades is the Grade Center in Blackboard.
6. If you are creating a screencast video or tutorial, be sure to
not inadvertently record sensitive information (such as your
emails, sensitive student information, or grades in Blackboard).
7. Do not write your password
down on a post-it note and leave it
on your desk, since it could be easily
stolen or viewed by other people.
8. Do not share any of your passwords or
your sensitive data with anyone – even your
colleagues or the helpdesk staff.


“Treat your password like your
toothbrush. Don’t let anybody
else use it, and get a new one
every six months.” ~ Clifford Stoll



The stronger your password,
the more protected your
account or computer is from
being compromised or hacked.
9. Use a Strong Password
Characteristics of strong
passwords:
◦ Are a minimum of 8 characters
in length, it’s highly
recommended that it’s 12
characters or more.
◦ Uses numbers and special
characters such as @#$%^&.
◦ Use a variation of upper and
lower case letters.
◦ It must not contain easily
guessed information such your
birth date, spouse’s name, pet’s
name, kid’s name, login name, etc.

Your pet’s name is not
a good password.

Example of a good password:
..///Jame$_B0nd!///..
9. Do not use the same password for your
personal and work accounts


If one of your accounts is  Don’t forget your
hacked, it’s likely that
computer and phone
your other accounts that logins!
used the same password
will quickly follow.
10. Know the different types of
Sensitive Information and protect it
Types of Sensitive Information
• Date of Birth
• Social Security Numbers
• Credit Card Numbers
• Street Address
• Bank Account Numbers
• Education Records
• Health Records

If your sensitive information is compromised, it could
drastically and adversely affect your life.
11. Do not store confidential work documents
or your Sensitive Information on cloud based
services such as Dropbox.com, Google Apps,
SugarSync.com, or other public cloud-based
storage systems.

Tip for staff: A good best practice is to keep your work documents saved on Wilmington
University’s local servers. This way the files are backed-up and secure.
12. Do not click links or open emails from senders
you do not recognize.
Phishing attempts are emails that try to trick you into clicking fake links to verify personal
information such as your passwords or social security numbers. Obvious giveaways in some fake
e-mails are:
• Misspellings, poor grammar, and repeated words or sentences.
• A real company will NEVER ask you to reconfirm data that’s been lost.
• Reputable companies usually address you by your first and last names rather than Dear
Member or Dear PayPal Customer.
You have Completed the Online Cyber
Security Awareness Training
Please take this Quiz to receive credit for
completing the Online Cyber Security Training.

Contenu connexe

Tendances

Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness trainingAbdalrhmanTHassan
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08DallasHaselhorst
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awarenessMichel Bitter
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness TrainingDave Monahan
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness TrainingWilliam Mann
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness TrainingJen Ruhman
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training OpenFred Beck MBA, CPA
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Programdavidcurriecia
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information SecurityKen Holmes
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnKloudLearn
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness TrainingRandy Bowman
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security AwarenessDale Rapp
 
Securityawareness
SecurityawarenessSecurityawareness
SecurityawarenessJayfErika
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness ProgramBill Gardner
 

Tendances (20)

Customer information security awareness training
Customer information security awareness trainingCustomer information security awareness training
Customer information security awareness training
 
Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08Cybersecurity Awareness Training Presentation v2021.08
Cybersecurity Awareness Training Presentation v2021.08
 
14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness14 tips to increase cybersecurity awareness
14 tips to increase cybersecurity awareness
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
Cybersecurity Awareness Training
Cybersecurity Awareness TrainingCybersecurity Awareness Training
Cybersecurity Awareness Training
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
Basic Security Training for End Users
Basic Security Training for End UsersBasic Security Training for End Users
Basic Security Training for End Users
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Security Awareness Training
Security Awareness TrainingSecurity Awareness Training
Security Awareness Training
 
Hyphenet Security Awareness Training
Hyphenet Security Awareness TrainingHyphenet Security Awareness Training
Hyphenet Security Awareness Training
 
Information Security Awareness Training Open
Information Security Awareness Training OpenInformation Security Awareness Training Open
Information Security Awareness Training Open
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
Employee Security Awareness Program
Employee Security Awareness ProgramEmployee Security Awareness Program
Employee Security Awareness Program
 
Awareness Training on Information Security
Awareness Training on Information SecurityAwareness Training on Information Security
Awareness Training on Information Security
 
Employee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - KloudlearnEmployee Awareness in Cyber Security - Kloudlearn
Employee Awareness in Cyber Security - Kloudlearn
 
Information Security Awareness Training
Information Security Awareness TrainingInformation Security Awareness Training
Information Security Awareness Training
 
Email Security Awareness
Email Security AwarenessEmail Security Awareness
Email Security Awareness
 
Cybersecurity Awareness
Cybersecurity AwarenessCybersecurity Awareness
Cybersecurity Awareness
 
Securityawareness
SecurityawarenessSecurityawareness
Securityawareness
 
Building An Information Security Awareness Program
Building An Information Security Awareness ProgramBuilding An Information Security Awareness Program
Building An Information Security Awareness Program
 

Similaire à Cyber security training

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness TrainingDenis kisina
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxbinowe
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptxreagan sapul
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxLaurieAnnFrazier
 
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)Jenine Sanchez
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxKevinRiley83
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygieneEricK Gasana
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptxDevenderDahiya9
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyCoyleFinancial
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxvasidharta
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protectionsajeena81
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service DeskNorthCoastHDI
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptxAljunMisa
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacyRozell Sneede
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security TipsInfusionsoft
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppWeSecureApp
 

Similaire à Cyber security training (20)

Employee Security Awareness Training
Employee Security Awareness TrainingEmployee Security Awareness Training
Employee Security Awareness Training
 
cybersafety_basics.pptx
cybersafety_basics.pptxcybersafety_basics.pptx
cybersafety_basics.pptx
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
securityawareness.pptx
securityawareness.pptxsecurityawareness.pptx
securityawareness.pptx
 
FHSU CITI CS Training.pptx
FHSU CITI CS Training.pptxFHSU CITI CS Training.pptx
FHSU CITI CS Training.pptx
 
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
KEEP IT SAFE FINAL IT Security A6 FINAL 2 (1)
 
Identity theft
Identity theftIdentity theft
Identity theft
 
TheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptxTheCyberThreatAndYou2_deck.pptx
TheCyberThreatAndYou2_deck.pptx
 
Safe Computing
Safe ComputingSafe Computing
Safe Computing
 
Basic_computerHygiene
Basic_computerHygieneBasic_computerHygiene
Basic_computerHygiene
 
6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx6 Cyber Security Introduction - sec101-idtheft .pptx
6 Cyber Security Introduction - sec101-idtheft .pptx
 
Identity Theft - by LINKS Technology
Identity Theft - by LINKS TechnologyIdentity Theft - by LINKS Technology
Identity Theft - by LINKS Technology
 
ISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptxISMS Awareness Training (2) (1).pptx
ISMS Awareness Training (2) (1).pptx
 
Cyber privacy and password protection
Cyber privacy and password protectionCyber privacy and password protection
Cyber privacy and password protection
 
Security and the Service Desk
Security and the Service DeskSecurity and the Service Desk
Security and the Service Desk
 
Internet Safety.pptx
Internet Safety.pptxInternet Safety.pptx
Internet Safety.pptx
 
5 a module online privacy
5 a module online privacy5 a module online privacy
5 a module online privacy
 
Information Secuirty
Information SecuirtyInformation Secuirty
Information Secuirty
 
7 Small Business Security Tips
7 Small Business Security Tips7 Small Business Security Tips
7 Small Business Security Tips
 
Cybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureAppCybersecurity Awareness E-Book - WeSecureApp
Cybersecurity Awareness E-Book - WeSecureApp
 

Plus de Wilmington University

Finding your Way Through Today's Technology
Finding your Way Through Today's TechnologyFinding your Way Through Today's Technology
Finding your Way Through Today's TechnologyWilmington University
 
Video Lectures in Blackboard the Cheap and Easy Way
Video Lectures in Blackboard the Cheap and Easy WayVideo Lectures in Blackboard the Cheap and Easy Way
Video Lectures in Blackboard the Cheap and Easy WayWilmington University
 
A Step Toward Creating ADA Compliant Course Sites, presented by Wilmington Un...
A Step Toward Creating ADA Compliant Course Sites, presented by Wilmington Un...A Step Toward Creating ADA Compliant Course Sites, presented by Wilmington Un...
A Step Toward Creating ADA Compliant Course Sites, presented by Wilmington Un...Wilmington University
 
Photos of Presenters from Wilmington University's 2014 Teaching and Learning ...
Photos of Presenters from Wilmington University's 2014 Teaching and Learning ...Photos of Presenters from Wilmington University's 2014 Teaching and Learning ...
Photos of Presenters from Wilmington University's 2014 Teaching and Learning ...Wilmington University
 
Web design , accessibility, and usability tips in Blackboard
Web design , accessibility, and usability tips in Blackboard Web design , accessibility, and usability tips in Blackboard
Web design , accessibility, and usability tips in Blackboard Wilmington University
 
eLearning Talk It Out, Using Voice in Your Course
eLearning  Talk It Out, Using Voice in Your Course eLearning  Talk It Out, Using Voice in Your Course
eLearning Talk It Out, Using Voice in Your Course Wilmington University
 
Wilmington University Instructors Celebrate NDLW
Wilmington University Instructors Celebrate NDLWWilmington University Instructors Celebrate NDLW
Wilmington University Instructors Celebrate NDLWWilmington University
 
SafeAssign Teaching Tool ...Not Gotcha
SafeAssign Teaching Tool ...Not GotchaSafeAssign Teaching Tool ...Not Gotcha
SafeAssign Teaching Tool ...Not GotchaWilmington University
 

Plus de Wilmington University (12)

Finding your Way Through Today's Technology
Finding your Way Through Today's TechnologyFinding your Way Through Today's Technology
Finding your Way Through Today's Technology
 
Video Lectures in Blackboard the Cheap and Easy Way
Video Lectures in Blackboard the Cheap and Easy WayVideo Lectures in Blackboard the Cheap and Easy Way
Video Lectures in Blackboard the Cheap and Easy Way
 
A Step Toward Creating ADA Compliant Course Sites, presented by Wilmington Un...
A Step Toward Creating ADA Compliant Course Sites, presented by Wilmington Un...A Step Toward Creating ADA Compliant Course Sites, presented by Wilmington Un...
A Step Toward Creating ADA Compliant Course Sites, presented by Wilmington Un...
 
Navigating the Online Student
Navigating the Online Student Navigating the Online Student
Navigating the Online Student
 
Photos of Presenters from Wilmington University's 2014 Teaching and Learning ...
Photos of Presenters from Wilmington University's 2014 Teaching and Learning ...Photos of Presenters from Wilmington University's 2014 Teaching and Learning ...
Photos of Presenters from Wilmington University's 2014 Teaching and Learning ...
 
Web design , accessibility, and usability tips in Blackboard
Web design , accessibility, and usability tips in Blackboard Web design , accessibility, and usability tips in Blackboard
Web design , accessibility, and usability tips in Blackboard
 
Password management
Password managementPassword management
Password management
 
What is vpn and how it can help you
What is vpn and how it can help youWhat is vpn and how it can help you
What is vpn and how it can help you
 
eLearning Talk It Out, Using Voice in Your Course
eLearning  Talk It Out, Using Voice in Your Course eLearning  Talk It Out, Using Voice in Your Course
eLearning Talk It Out, Using Voice in Your Course
 
Wilmington University Instructors Celebrate NDLW
Wilmington University Instructors Celebrate NDLWWilmington University Instructors Celebrate NDLW
Wilmington University Instructors Celebrate NDLW
 
SafeAssign at Wilmington University
SafeAssign at Wilmington UniversitySafeAssign at Wilmington University
SafeAssign at Wilmington University
 
SafeAssign Teaching Tool ...Not Gotcha
SafeAssign Teaching Tool ...Not GotchaSafeAssign Teaching Tool ...Not Gotcha
SafeAssign Teaching Tool ...Not Gotcha
 

Dernier

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGSujit Pal
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Dernier (20)

Google AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAGGoogle AI Hackathon: LLM based Evaluator for RAG
Google AI Hackathon: LLM based Evaluator for RAG
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Cyber security training

  • 1. Wilmington University Online Cyber Security Training This training will cover 12 simple tips that WilmU faculty and staff members should know and actively practice.
  • 2. Family Educational Rights and Privacy Act (FERPA) The purpose of FERPA is to protect educational records. This includes:  A student’s personal information  Enrollment records  Grades  Schedules  Financial aid documents  Payment account information. Here’s a few ways you can help keep educational records safe under FERPA Compliance:
  • 3. 1. If you step away from your computer, lock it! You work on important things - make sure they stay safe and secure How to Quickly Lock Your Computer If you’re stepping away from your computer for a moment, you may want to lock your computer. Locking your PC is an easy way to hide any sensitive information that is displayed on your screen, such as a student record in CAMS. Use this keyboard shortcut to instantly lock your computer: press the Windows logo key + L.
  • 4. 2. If you print a student transcript to a copier in a public area, retrieve it immediately
  • 5. 3. Be sure to destroy sensitive documents. Place them in the shred bins or a shredder - never throw away in a regular trashcan anything with an educational record.
  • 6. 4. Always remember to logout of Blackboard, especially if you are on a public computer. Otherwise someone could access the student grades in your course’s grade center.
  • 7. 5. Never leave graded assignments in a stack for students to pick up by sorting through the papers of all students. The best place to distribute student grades is the Grade Center in Blackboard.
  • 8. 6. If you are creating a screencast video or tutorial, be sure to not inadvertently record sensitive information (such as your emails, sensitive student information, or grades in Blackboard).
  • 9. 7. Do not write your password down on a post-it note and leave it on your desk, since it could be easily stolen or viewed by other people.
  • 10. 8. Do not share any of your passwords or your sensitive data with anyone – even your colleagues or the helpdesk staff.  “Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” ~ Clifford Stoll  The stronger your password, the more protected your account or computer is from being compromised or hacked.
  • 11. 9. Use a Strong Password Characteristics of strong passwords: ◦ Are a minimum of 8 characters in length, it’s highly recommended that it’s 12 characters or more. ◦ Uses numbers and special characters such as @#$%^&. ◦ Use a variation of upper and lower case letters. ◦ It must not contain easily guessed information such your birth date, spouse’s name, pet’s name, kid’s name, login name, etc. Your pet’s name is not a good password. Example of a good password: ..///Jame$_B0nd!///..
  • 12. 9. Do not use the same password for your personal and work accounts  If one of your accounts is  Don’t forget your hacked, it’s likely that computer and phone your other accounts that logins! used the same password will quickly follow.
  • 13. 10. Know the different types of Sensitive Information and protect it Types of Sensitive Information • Date of Birth • Social Security Numbers • Credit Card Numbers • Street Address • Bank Account Numbers • Education Records • Health Records If your sensitive information is compromised, it could drastically and adversely affect your life.
  • 14. 11. Do not store confidential work documents or your Sensitive Information on cloud based services such as Dropbox.com, Google Apps, SugarSync.com, or other public cloud-based storage systems. Tip for staff: A good best practice is to keep your work documents saved on Wilmington University’s local servers. This way the files are backed-up and secure.
  • 15. 12. Do not click links or open emails from senders you do not recognize. Phishing attempts are emails that try to trick you into clicking fake links to verify personal information such as your passwords or social security numbers. Obvious giveaways in some fake e-mails are: • Misspellings, poor grammar, and repeated words or sentences. • A real company will NEVER ask you to reconfirm data that’s been lost. • Reputable companies usually address you by your first and last names rather than Dear Member or Dear PayPal Customer.
  • 16. You have Completed the Online Cyber Security Awareness Training Please take this Quiz to receive credit for completing the Online Cyber Security Training.

Notes de l'éditeur

  1. Source: http://nakedsecurity.sophos.com/2012/08/26/assange-to-be-arrested-british-police-in-document-dissemination-gaffe/