Wilmington University
Online Cyber Security
Training
This training will cover 12 simple tips that WilmU
faculty and staff ...
Family Educational Rights and Privacy
Act (FERPA)
The purpose of FERPA is to
protect educational records.
This includes:
...
1. If you step away from your computer, lock it!
You work on important things - make sure they
stay safe and secure
How to...
2. If you print a student transcript to a copier
in a public area, retrieve it immediately
3. Be sure to destroy sensitive documents.
Place them in the shred bins or a shredder never throw away in a regular trashc...
4. Always remember to logout of Blackboard, especially
if you are on a public computer. Otherwise someone
could access the...
5. Never leave graded assignments in a stack for
students to pick up by sorting through the papers
of all students. The be...
6. If you are creating a screencast video or tutorial, be
sure to not inadvertently record sensitive information
(such as ...
7. Do not write your password
down on a post-it note and leave
it on your desk, since it could be
easily stolen or viewed ...
8. Do not share any of your passwords
or your sensitive data with anyone –
even your colleagues or the helpdesk
staff.


...
9. Use a Strong Password
Characteristics of strong
passwords:
◦ Are a minimum of 8
characters in length, it’s highly
recom...
9. Do not use the same password for
your personal and work accounts


If one of your accounts
is hacked, it’s likely
that...
If connecting to an Internal IT system such
as the Business Portal from a Wi-Fi
connection, do so on the administrative
ne...
11. Do not store confidential work
documents on cloud based services such
as Dropbox.com or SugarSync.com. Keep
them on Wi...
12. Do not fill any form on the Web with your personal information
unless you know you can trust it. The Internet is full ...
Upcoming SlideShare
Loading in...5
×

Cyber security training

247

Published on

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
247
On Slideshare
0
From Embeds
0
Number of Embeds
3
Actions
Shares
0
Downloads
2
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • Source: http://nakedsecurity.sophos.com/2012/08/26/assange-to-be-arrested-british-police-in-document-dissemination-gaffe/
  • Cyber security training

    1. 1. Wilmington University Online Cyber Security Training This training will cover 12 simple tips that WilmU faculty and staff members should know and actively practice.
    2. 2. Family Educational Rights and Privacy Act (FERPA) The purpose of FERPA is to protect educational records. This includes:  A student’s personal information  Enrollment records  Grades  Schedules  Financial aid documents  Payment account information. Here’s a few ways you can help keep educational records safe under FERPA Compliance:
    3. 3. 1. If you step away from your computer, lock it! You work on important things - make sure they stay safe and secure How to Quickly Lock Your Computer If you’re stepping away from your computer for a moment, you may want to lock your computer. Locking your PC is an easy way to hide any sensitive information that is displayed on your screen, such as a student record in CAMS. Use this keyboard shortcut to instantly lock your computer: press the Windows logo key + L.
    4. 4. 2. If you print a student transcript to a copier in a public area, retrieve it immediately
    5. 5. 3. Be sure to destroy sensitive documents. Place them in the shred bins or a shredder never throw away in a regular trashcan anything with an educational record.
    6. 6. 4. Always remember to logout of Blackboard, especially if you are on a public computer. Otherwise someone could access the student grades in your course’s grade center.
    7. 7. 5. Never leave graded assignments in a stack for students to pick up by sorting through the papers of all students. The best place to distribute student grades is the Grade Center in Blackboard.
    8. 8. 6. If you are creating a screencast video or tutorial, be sure to not inadvertently record sensitive information (such as your emails, sensitive student information, or grades in Blackboard).
    9. 9. 7. Do not write your password down on a post-it note and leave it on your desk, since it could be easily stolen or viewed by other people.
    10. 10. 8. Do not share any of your passwords or your sensitive data with anyone – even your colleagues or the helpdesk staff.  “Treat your password like your toothbrush. Don’t let anybody else use it, and get a new one every six months.” ~ Clifford Stoll  The stronger your password, the more protected your account or computer is from being compromised or hacked.
    11. 11. 9. Use a Strong Password Characteristics of strong passwords: ◦ Are a minimum of 8 characters in length, it’s highly recommended that it’s 12 characters or more. ◦ Uses numbers and special characters such as @#$%^&. ◦ Use a variation of upper and lower case letters. ◦ It must not contain easily guessed information such your birth date, spouse’s name, pet’s name, kid’s You pet’s name is not a good password. Example of a good password:
    12. 12. 9. Do not use the same password for your personal and work accounts  If one of your accounts is hacked, it’s likely that your other accounts that used the same password will quickly follow.  Don’t forget your computer and phone logins!
    13. 13. If connecting to an Internal IT system such as the Business Portal from a Wi-Fi connection, do so on the administrative network not the Wildcats Network.
    14. 14. 11. Do not store confidential work documents on cloud based services such as Dropbox.com or SugarSync.com. Keep them on Wilmington University’s local severs.
    15. 15. 12. Do not fill any form on the Web with your personal information unless you know you can trust it. The Internet is full of fraudulent websites, so you have to be aware of phishing attempts. Phishing attempts are emails that try to trick you into clicking fake links to verify personal information such as your passwords or social security numbers. Obvious giveaways in some fake e-mails are: • Misspellings, poor grammar, and repeated words or sentences. • A real company will NEVER ask you to reconfirm data that’s been lost. • Reputable companies usually address you by your first and last names rather than Dear Member or Dear PayPal Customer.
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×