Online Cyber Security
This training will cover 12 simple tips that WilmU
faculty and staff members should know and
Family Educational Rights and Privacy
The purpose of FERPA is to
protect educational records.
A student’s personal
Financial aid documents
Here’s a few ways you can help keep educational
records safe under FERPA Compliance:
1. If you step away from your computer, lock it!
You work on important things - make sure they
stay safe and secure
How to Quickly Lock
If you’re stepping away
from your computer for a
moment, you may want to
lock your computer.
Locking your PC is an
easy way to hide any
sensitive information that
is displayed on your
screen, such as a student
record in CAMS.
Use this keyboard
shortcut to instantly lock
your computer: press
the Windows logo key +
2. If you print a student transcript to a copier
in a public area, retrieve it immediately
3. Be sure to destroy sensitive documents.
Place them in the shred bins or a shredder never throw away in a regular trashcan
anything with an educational record.
4. Always remember to logout of Blackboard, especially
if you are on a public computer. Otherwise someone
could access the student grades in your course’s grade
5. Never leave graded assignments in a stack for
students to pick up by sorting through the papers
of all students. The best place to distribute
student grades is the Grade Center in
6. If you are creating a screencast video or tutorial, be
sure to not inadvertently record sensitive information
(such as your emails, sensitive student information, or
grades in Blackboard).
7. Do not write your password
down on a post-it note and leave
it on your desk, since it could be
easily stolen or viewed by other
8. Do not share any of your passwords
or your sensitive data with anyone –
even your colleagues or the helpdesk
“Treat your password like
your toothbrush. Don’t let
anybody else use it, and get a
new one every six months.”
~ Clifford Stoll
The stronger your password,
the more protected your
account or computer is from
being compromised or
9. Use a Strong Password
Characteristics of strong
◦ Are a minimum of 8
characters in length, it’s highly
recommended that it’s 12
characters or more.
◦ Uses numbers and special
characters such as @#$%^&.
◦ Use a variation of upper and
lower case letters.
◦ It must not contain easily
guessed information such
your birth date, spouse’s
name, pet’s name, kid’s
You pet’s name is not
a good password.
Example of a good
9. Do not use the same password for
your personal and work accounts
If one of your accounts
is hacked, it’s likely
that your other
accounts that used the
same password will
Don’t forget your
computer and phone
If connecting to an Internal IT system such
as the Business Portal from a Wi-Fi
connection, do so on the administrative
network not the Wildcats Network.
11. Do not store confidential work
documents on cloud based services such
as Dropbox.com or SugarSync.com. Keep
them on Wilmington University’s local
12. Do not fill any form on the Web with your personal information
unless you know you can trust it. The Internet is full of fraudulent
websites, so you have to be aware of phishing attempts.
Phishing attempts are emails that try to trick you into clicking fake links to verify personal
information such as your passwords or social security numbers. Obvious giveaways in
some fake e-mails are:
• Misspellings, poor grammar, and repeated words or sentences.
• A real company will NEVER ask you to reconfirm data that’s been lost.
• Reputable companies usually address you by your first and last names rather than
Dear Member or Dear PayPal Customer.
A particular slide catching your eye?
Clipping is a handy way to collect important slides you want to go back to later.