SlideShare ist ein Scribd-Unternehmen logo
1 von 15
Wilmington University
Online Cyber Security
Training
This training will cover 12 simple tips that WilmU
faculty and staff members should know and
actively practice.
Family Educational Rights and Privacy
Act (FERPA)
The purpose of FERPA is to
protect educational records.
This includes:
 A student’s personal
information
 Enrollment records
 Grades
 Schedules
 Financial aid documents
 Payment account
information.

Here’s a few ways you can help keep educational
records safe under FERPA Compliance:
1. If you step away from your computer, lock it!
You work on important things - make sure they
stay safe and secure
How to Quickly Lock
Your Computer
If you’re stepping away
from your computer for a
moment, you may want to
lock your computer.
Locking your PC is an
easy way to hide any
sensitive information that
is displayed on your
screen, such as a student
record in CAMS.

Use this keyboard
shortcut to instantly lock
your computer: press
the Windows logo key +
L.
2. If you print a student transcript to a copier
in a public area, retrieve it immediately
3. Be sure to destroy sensitive documents.
Place them in the shred bins or a shredder never throw away in a regular trashcan
anything with an educational record.
4. Always remember to logout of Blackboard, especially
if you are on a public computer. Otherwise someone
could access the student grades in your course’s grade
center.
5. Never leave graded assignments in a stack for
students to pick up by sorting through the papers
of all students. The best place to distribute
student grades is the Grade Center in
Blackboard.
6. If you are creating a screencast video or tutorial, be
sure to not inadvertently record sensitive information
(such as your emails, sensitive student information, or
grades in Blackboard).
7. Do not write your password
down on a post-it note and leave
it on your desk, since it could be
easily stolen or viewed by other
people.
8. Do not share any of your passwords
or your sensitive data with anyone –
even your colleagues or the helpdesk
staff.


“Treat your password like
your toothbrush. Don’t let
anybody else use it, and get a
new one every six months.”
~ Clifford Stoll



The stronger your password,
the more protected your
account or computer is from
being compromised or
hacked.
9. Use a Strong Password
Characteristics of strong
passwords:
◦ Are a minimum of 8
characters in length, it’s highly
recommended that it’s 12
characters or more.
◦ Uses numbers and special
characters such as @#$%^&.
◦ Use a variation of upper and
lower case letters.
◦ It must not contain easily
guessed information such
your birth date, spouse’s
name, pet’s name, kid’s

You pet’s name is not
a good password.

Example of a good
password:
9. Do not use the same password for
your personal and work accounts


If one of your accounts
is hacked, it’s likely
that your other
accounts that used the
same password will
quickly follow.



Don’t forget your
computer and phone
logins!
If connecting to an Internal IT system such
as the Business Portal from a Wi-Fi
connection, do so on the administrative
network not the Wildcats Network.
11. Do not store confidential work
documents on cloud based services such
as Dropbox.com or SugarSync.com. Keep
them on Wilmington University’s local
severs.
12. Do not fill any form on the Web with your personal information
unless you know you can trust it. The Internet is full of fraudulent
websites, so you have to be aware of phishing attempts.
Phishing attempts are emails that try to trick you into clicking fake links to verify personal
information such as your passwords or social security numbers. Obvious giveaways in
some fake e-mails are:
• Misspellings, poor grammar, and repeated words or sentences.
• A real company will NEVER ask you to reconfirm data that’s been lost.
• Reputable companies usually address you by your first and last names rather than
Dear Member or Dear PayPal Customer.

Weitere ähnliche Inhalte

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Kürzlich hochgeladen (20)

The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Empfohlen

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Empfohlen (20)

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 
ChatGPT webinar slides
ChatGPT webinar slidesChatGPT webinar slides
ChatGPT webinar slides
 

Cyber security training

  • 1. Wilmington University Online Cyber Security Training This training will cover 12 simple tips that WilmU faculty and staff members should know and actively practice.
  • 2. Family Educational Rights and Privacy Act (FERPA) The purpose of FERPA is to protect educational records. This includes:  A student’s personal information  Enrollment records  Grades  Schedules  Financial aid documents  Payment account information. Here’s a few ways you can help keep educational records safe under FERPA Compliance:
  • 3. 1. If you step away from your computer, lock it! You work on important things - make sure they stay safe and secure How to Quickly Lock Your Computer If you’re stepping away from your computer for a moment, you may want to lock your computer. Locking your PC is an easy way to hide any sensitive information that is displayed on your screen, such as a student record in CAMS. Use this keyboard shortcut to instantly lock your computer: press the Windows logo key + L.
  • 4. 2. If you print a student transcript to a copier in a public area, retrieve it immediately
  • 5. 3. Be sure to destroy sensitive documents. Place them in the shred bins or a shredder never throw away in a regular trashcan anything with an educational record.
  • 6. 4. Always remember to logout of Blackboard, especially if you are on a public computer. Otherwise someone could access the student grades in your course’s grade center.
  • 7. 5. Never leave graded assignments in a stack for students to pick up by sorting through the papers of all students. The best place to distribute student grades is the Grade Center in Blackboard.
  • 8. 6. If you are creating a screencast video or tutorial, be sure to not inadvertently record sensitive information (such as your emails, sensitive student information, or grades in Blackboard).
  • 9. 7. Do not write your password down on a post-it note and leave it on your desk, since it could be easily stolen or viewed by other people.
  • 10. 8. Do not share any of your passwords or your sensitive data with anyone – even your colleagues or the helpdesk staff.  “Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” ~ Clifford Stoll  The stronger your password, the more protected your account or computer is from being compromised or hacked.
  • 11. 9. Use a Strong Password Characteristics of strong passwords: ◦ Are a minimum of 8 characters in length, it’s highly recommended that it’s 12 characters or more. ◦ Uses numbers and special characters such as @#$%^&. ◦ Use a variation of upper and lower case letters. ◦ It must not contain easily guessed information such your birth date, spouse’s name, pet’s name, kid’s You pet’s name is not a good password. Example of a good password:
  • 12. 9. Do not use the same password for your personal and work accounts  If one of your accounts is hacked, it’s likely that your other accounts that used the same password will quickly follow.  Don’t forget your computer and phone logins!
  • 13. If connecting to an Internal IT system such as the Business Portal from a Wi-Fi connection, do so on the administrative network not the Wildcats Network.
  • 14. 11. Do not store confidential work documents on cloud based services such as Dropbox.com or SugarSync.com. Keep them on Wilmington University’s local severs.
  • 15. 12. Do not fill any form on the Web with your personal information unless you know you can trust it. The Internet is full of fraudulent websites, so you have to be aware of phishing attempts. Phishing attempts are emails that try to trick you into clicking fake links to verify personal information such as your passwords or social security numbers. Obvious giveaways in some fake e-mails are: • Misspellings, poor grammar, and repeated words or sentences. • A real company will NEVER ask you to reconfirm data that’s been lost. • Reputable companies usually address you by your first and last names rather than Dear Member or Dear PayPal Customer.

Hinweis der Redaktion

  1. Source: http://nakedsecurity.sophos.com/2012/08/26/assange-to-be-arrested-british-police-in-document-dissemination-gaffe/