Cybersecurity
/prod02/channel_1/media/academic-and-institutional-technology/Phishing-Attempts.png)
Avoiding Phishing Attempts
Phishing is when someone lies in order to obtain your personal information. Here's what to look out for. >>
/prod02/channel_1/media/academic-and-institutional-technology/Simple-Steps.png)
Three Simple Steps to Cybersecurity
Follow these basic rules to help protect your personal information and devices. >>
/prod02/channel_1/media/academic-and-institutional-technology/Cybersecurity-Training.png)
Employee Cybersecurity Training
Cybersecurity awareness training gives employees a working understanding of basic cybersecurity principles and precautions. >>
/prod02/channel_1/media/academic-and-institutional-technology/2fa-icon-Blue.png)
Duo Two-Factor Authentication
Duo provides two-factor authentication which provides a second layer of security to your accounts. >>
/prod02/channel_1/media/academic-and-institutional-technology/Disk-Encryption.png)
Disk Encryption
Whole disk encryption adds another layer of protection for your data if your computer is lost or stolen. >>
/prod02/channel_1/media/academic-and-institutional-technology/Cybersecurity-Training.png)
Microsoft Defender for O365 Email Protection Service
Microsoft Defender for O365 Email Protection Service is an AI-driven email filtering service. >>
/prod02/channel_1/media/academic-and-institutional-technology/Video-Contest.png)
Cybersecurity Video Contest
Wheaton College students create short videos about cybersecurity for the chance to win prizes. >>