Here is an overview of what we covered

Simple Steps to Online Safety In The Home

This outlines the common steps that anyone can take to protect themselves in their everyday lives. 

FTC Links

Protecting Against Identity Theft

https://www.consumer.ftc.gov/blog/2017/09/equifax-data-breach-what-do

https://www.us-cert.gov/ncas/tips/ST05-019

PDF

Four Steps to Staying Secure

Creating a Cyber Secure Home

Poster

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201610_en.pdf

https://securingthehuman.sans.org/media/resources/STH-Poster-CyberSecureHome-Print.pdf

Video

12 min

Securing Your Kids

Video

More

Other resources

information

Video 58min

Gaming Online  Safely and Securely PDF

https://www.rsaconference.com/videos/cybersmart-parents-education-workshop-lance-spitzner

  • Strangers (predators, sextortion, fraud)
  • Friends (sexting, griefing, cyber-bullying)
  • Themselves (sexting, social media, sharing personal information)

https://www.youtube.com/watch?v=Ym21rFIJu8Y

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201707_en.pdf

Cybersecurity in the Workplace Is Everyone's Business

Whatever your place of business, creating a culture of cybersecurity from the breakroom to the boardroom is essential and a shared responsibility among all employees.

PDF

Social Engineering

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201701_en.pdf

PDF

You Are a Target

Poster

https://www.sans.org/security-resources/posters/target/100/download

Video

2-min

Cloud Security Awareness Training

https://www.youtube.com/watch?time_continue=4&v=7HiKkWDuvMU

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201611_en.pdf 

Don’t Get Fished!

Individuals and organizations understand the Phishing phenomenon that we have experienced over the last several years. Specially crafted phishing messages are sent to entice an individual into clicking on a malicious link, opening an infected attachment, or responding to a scam. Here is information to identify these types of emails.

PDF

CEO Fraud

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201607_en.pdf

PDF

Don’t get hooked

Poster

https://www.sans.org/security-resources/posters/hooked/85/download

https://cdn2.hubspot.net/hubfs/241394/Knowbe4-May2015-PDF/SocialEngineeringRedFlags.pdf

Video

3min

Cybersecurity Awareness - Phishing Attacks

https://www.youtube.com/watch?v=5RHeJAEdiEc&t=22s

Today's Predictions for Tomorrow's Internet

With the explosion of digital interconnectivity, it is critical to explore everyone's role in protecting our cyber ecosystem.

PDF

Video 2 min

Two-step (two- factor) Verification

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201509_en.pdf

https://www.youtube.com/watch?v=kHI90LbBwaQ

PDF

Passphrases

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201704_en.pdf

PDF

Internet of Things (IoT)

https://securingthehuman.sans.org/newsletters/ouch/issues/OUCH-201605_en.pdf

SAVE FOR A RAINY DAY.

MIND YOUR Ps AND Qs.

OWN YOUR ONLINE PRESENCE.

Set your privacy and security settings so you share at your
comfort level and be savvy about your online reputation.

Stop. Think. Connect.

The University provides external links for their potential educational value. However, the university is not responsible for the contents of linked sites or any external links contained on those sites.  The inclusion of any link does not imply endorsement of its content, and the university assumes no legal liability relevant to its usage. Please contact the linked site with any concerns or needed accommodations for disability requirements.