Online Cyber Security Training
This training will cover 12 simple tips that WilmU
faculty and staff members should know and actively
Family Educational Rights and Privacy Act
The purpose of FERPA is to
protect educational records.
A student’s personal
Financial aid documents
Here’s a few ways you can help keep educational records
safe under FERPA Compliance:
1. If you step away from your computer, lock it! You
work on important things - make sure they stay safe
How to Quickly Lock
If you’re stepping away from
your computer for a
moment, you may want to
lock your computer. Locking
your PC is an easy way to
hide any sensitive
information that is displayed
on your screen, such as a
student record in CAMS.
Use this keyboard
shortcut to instantly lock
your computer: press the
Windows logo key + L.
2. If you print a student transcript to a copier in
a public area, retrieve it immediately
3. Be sure to destroy sensitive documents. Place
them in the shred bins or a shredder - never
throw away in a regular trashcan anything with
an educational record.
4. Always remember to logout of Blackboard, especially if you
are on a public computer. Otherwise someone could access
the student grades in your course’s grade center.
5. Never leave graded assignments in a stack for
students to pick up by sorting through the papers of
all students. The best place to distribute student
grades is the Grade Center in Blackboard.
6. If you are creating a screencast video or tutorial, be sure to
not inadvertently record sensitive information (such as your
emails, sensitive student information, or grades in Blackboard).
7. Do not write your password
down on a post-it note and leave it
on your desk, since it could be easily
stolen or viewed by other people.
8. Do not share any of your passwords or
your sensitive data with anyone – even your
colleagues or the helpdesk staff.
“Treat your password like your
toothbrush. Don’t let anybody
else use it, and get a new one
every six months.” ~ Clifford Stoll
The stronger your password,
the more protected your
account or computer is from
being compromised or hacked.
9. Use a Strong Password
Characteristics of strong
◦ Are a minimum of 8 characters
in length, it’s highly
recommended that it’s 12
characters or more.
◦ Uses numbers and special
characters such as @#$%^&.
◦ Use a variation of upper and
lower case letters.
◦ It must not contain easily
guessed information such your
birth date, spouse’s name, pet’s
name, kid’s name, login name, etc.
Your pet’s name is not
a good password.
Example of a good password:
9. Do not use the same password for your
personal and work accounts
If one of your accounts is Don’t forget your
hacked, it’s likely that
computer and phone
your other accounts that logins!
used the same password
will quickly follow.
10. Know the different types of
Sensitive Information and protect it
Types of Sensitive Information
• Date of Birth
• Social Security Numbers
• Credit Card Numbers
• Street Address
• Bank Account Numbers
• Education Records
• Health Records
If your sensitive information is compromised, it could
drastically and adversely affect your life.
11. Do not store confidential work documents
or your Sensitive Information on cloud based
services such as Dropbox.com, Google Apps,
SugarSync.com, or other public cloud-based
Tip for staff: A good best practice is to keep your work documents saved on Wilmington
University’s local servers. This way the files are backed-up and secure.
12. Do not click links or open emails from senders
you do not recognize.
Phishing attempts are emails that try to trick you into clicking fake links to verify personal
information such as your passwords or social security numbers. Obvious giveaways in some fake
• Misspellings, poor grammar, and repeated words or sentences.
• A real company will NEVER ask you to reconfirm data that’s been lost.
• Reputable companies usually address you by your first and last names rather than Dear
Member or Dear PayPal Customer.
You have Completed the Online Cyber
Security Awareness Training
Please take this Quiz to receive credit for
completing the Online Cyber Security Training.