• Data breaches are a very real threat facing educational institutions. As hackers attempt to access sensitive information in new and ever-evolving ways, it’s essential to train on these risks to increase awareness of potential threats and mitigate the consequences of a breach. This award-winning learning program provides faculty and staff with a high-level overview of data security issues and practical steps your institution can take to avoid data breaches.


    Course ─ Malware

    Topics covered:

    • Why academia is a target of malware attacks
    • Different types of malware
    • How malware can be delivered
    • The increasing threat posed by malware, especially ransomware
    • What to do when encountering a malware attack
    Audience: Faculty, staff
    Course length: 10 minutes

    Course ─ Mobile Devices and Third-Party Websites

    Mobile Devices Screenshot

    Topics covered:

    • Not allowing unauthorized access to secured buildings or physical files and electronic devices
    • The importance of keeping mobile devices' software up-to-date
    • The benefits of using multifactor authentication
    Audience: Faculty, staff
    Course length: 10 minutes

    Course ─ Passwords

    Topics covered:

    • What makes a good password
    • Best practices for using passwords
    • The importance of creating a unique password for each website
    • What password managers are and how they work
    • The basics of multifactor authentication
    Audience: Faculty, staff
    Course length: 10 minutes

    Course ─ Phishing

    Phishing Screenshot

    Topics covered:

    • Understanding what motivates scammers to deploy phishing emails
    • Staying vigilant when using institutional email
    • Seeking help when encountering a phishing scam
    Audience: Faculty, staff
    Course length: 10 minutes

    Course ─ Physical Security and Unintended Disclosures

    Topics covered:

    • The risk of allowing physical access to physical files and electronic devices
    • Types of sensitive data at academic institutions that can be exposed
    • The importance of preventing unauthorized access to secured buildings
    • The importance of locking unattended physical files and electronic devices
    • Staying mindful of inadvertent disclosures
    • Staying mindful of inadvertent disclosures
    • The risks of device theft while traveling
    Audience: Faculty, staff
    Course length: 10 minutes

    stevie gold winner logo stevie gold winner logo