cyber security training

16
Wilmington University Online Cyber Security Training This training will cover 12 simple tips that WilmU faculty and staff members should know and actively practice.

Upload: wilmington-university

Post on 15-May-2015

720 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: Cyber security training

Wilmington University

Online Cyber Security Training This training will cover 12 simple tips that WilmU

faculty and staff members should know and actively

practice.

Page 2: Cyber security training

Family Educational Rights and Privacy Act

(FERPA) The purpose of FERPA is to protect educational records. This includes:

A student’s personal information

Enrollment records

Grades

Schedules

Financial aid documents

Payment account information.

Here’s a few ways you can help keep educational records

safe under FERPA Compliance:

Page 3: Cyber security training

1. If you step away from your computer, lock it! You

work on important things - make sure they stay safe

and secure

How to Quickly Lock Your Computer

If you’re stepping away from your computer for a moment, you may want to lock your computer. Locking your PC is an easy way to hide any sensitive information that is displayed on your screen, such as a student record in CAMS.

Use this keyboard

shortcut to instantly lock

your computer: press the

Windows logo key + L.

Page 4: Cyber security training

2. If you print a student transcript to a copier in

a public area, retrieve it immediately

Page 5: Cyber security training

3. Be sure to destroy sensitive documents. Place

them in the shred bins or a shredder - never

throw away in a regular trashcan anything with

an educational record.

Page 6: Cyber security training

4. Always remember to logout of Blackboard, especially if you

are on a public computer. Otherwise someone could access

the student grades in your course’s grade center.

Page 7: Cyber security training

5. Never leave graded assignments in a stack for

students to pick up by sorting through the papers of

all students. The best place to distribute student

grades is the Grade Center in Blackboard.

Page 8: Cyber security training

6. If you are creating a screencast video or tutorial, be sure to

not inadvertently record sensitive information (such as your

emails, sensitive student information, or grades in Blackboard).

Page 9: Cyber security training

7. Do not write your password

down on a post-it note and leave it

on your desk, since it could be easily

stolen or viewed by other people.

Page 10: Cyber security training

8. Do not share any of your passwords or

your sensitive data with anyone – even your

colleagues or the helpdesk staff.

“Treat your password like your

toothbrush. Don’t let anybody

else use it, and get a new one

every six months.” ~ Clifford Stoll

The stronger your password,

the more protected your

account or computer is from

being compromised or hacked.

Page 11: Cyber security training

9. Use a Strong Password Characteristics of strong

passwords:

◦ Are a minimum of 8 characters

in length, it’s highly

recommended that it’s 12

characters or more.

◦ Uses numbers and special

characters such as @#$%^&.

◦ Use a variation of upper and

lower case letters.

◦ It must not contain easily

guessed information such your

birth date, spouse’s name, pet’s

name, kid’s name, login name, etc.

Your pet’s name is not

a good password.

Example of a good password:

..///Jame$_B0nd!///..

Page 12: Cyber security training

9. Do not use the same password for your

personal and work accounts

If one of your accounts is

hacked, it’s likely that

your other accounts that

used the same password

will quickly follow.

Don’t forget your

computer and phone

logins!

Page 13: Cyber security training

10. Know the different types of

Sensitive Information and protect it Types of Sensitive Information

• Date of Birth

• Social Security Numbers

• Credit Card Numbers

• Street Address

• Bank Account Numbers

• Education Records

• Health Records

If your sensitive information is compromised, it could

drastically and adversely affect your life.

Page 14: Cyber security training

11. Do not store confidential work documents

or your Sensitive Information on cloud based

services such as Dropbox.com, Google Apps,

SugarSync.com, or other public cloud-based

storage systems.

Tip for staff: A good best practice is to keep your work documents saved on Wilmington

University’s local servers. This way the files are backed-up and secure.

Page 15: Cyber security training

12. Do not click links or open emails from senders

you do not recognize.

Phishing attempts are emails that try to trick you into clicking fake links to verify personal

information such as your passwords or social security numbers. Obvious giveaways in some fake

e-mails are:

• Misspellings, poor grammar, and repeated words or sentences.

• A real company will NEVER ask you to reconfirm data that’s been lost.

• Reputable companies usually address you by your first and last names rather than Dear

Member or Dear PayPal Customer.

Page 16: Cyber security training

You have Completed the Online Cyber

Security Awareness Training

Please take this Quiz to receive credit for

completing the Online Cyber Security Training.