Category Archives: Information Security

SANS: Specific Departments or Areas

The following six videos are targeted for specific departments or areas. Federal Tax Information 03:42 Any organization working with federal tax information is regulated by federal law and required to take specific steps to protect that data. This module explains what federal tax information is, and details the steps that must be taken to protect […]

SANS: Frequently Asked Questions (FAQs)

We hope you find the following FAQs helpful. What browser do I use to log in to SANS? Do I have to answer all the questions for each tutorial? Can I watch a tutorial more than once? How long will it take to complete all the required tutorials? What browser do I use to log in […]

SANS: Continuing Education Series

The Continuing Education Series is comprised of the following three modules: Hacked 02:19 No matter how effective and secure employees are, there will be incidents. This module focuses on how employees can identify and report an incident. It also covers things to look for, such as passwords no longer working or virus alerts, and whom […]

SANS Securing the Human

The SANS Securing the Human (STH) instructional materials are a series of short online video tutorials available to staff and faculty through a DePauw subscription. Each tutorial is followed by a couple of questions to ensure that you understood the tutorial’s most important points. As an important part of DePauw’s strategy for CyberSecurity protection, the Information […]

SANS: Core Education Series Module Descriptions

Core Education Series The Core Education Series is intended to provide all employees with the training needed to be compliant with overall security awareness standards. The 15 modules in this series portray realistic, memorable scenarios that are transferable to everyday tasks, and the series can be completed in less than 50 minutes. Whether it is […]

Protecting your identity

Identity theft is a growing risk due to an increased interest in online banking, social networking sites, mobile downloads, online gaming and other popular online activities. Gaining a better awareness of your level of exposure and adopting secure computing practices are steps you can take to reduce your risk to identity theft. Best practices Saving […]

Managing data

On a daily basis, there may be several types of private data that you access, and all of this data needs to be protected in a secure location. This data may include Personally Identifiable Information (PII), intellectual property, institutional data or other information that needs to be kept secure. As an institution, we must be […]

2017 Top Ten for Information Security: Faculty and Staff

Follow our top 10 recommendations to keep sensitive information secure – both professional and personal – and maintain others’ privacy. Recommendations Do not save sensitive information, including student data, on a hard drive or a USB drive nor share it through email. Use Secure Wireless on campus and the virtual private network (VPN) from off […]

Phishing

Phishing or spoofing is when the recipient of a fraudulent email is tricked into disclosing personally identifiable information, such as their username and password, social security number, date of birth and/or credit card numbers. Although most phishing scams are received through email, they can also come in the form of a text or a phone […]

Minimizing threats

When thinking about information security risks, assume you are the target. Try to get familiar with possible threats so you can develop more cautious habits in your daily work routine. Some common risks are described in this article. Accidental disclosure Alerts Baiting Phishing Social engineering Spam Spyware Accidental disclosure Have you forwarded an email thread […]