Cybersecurity Awareness

Data Privacy Day Posters 2021

Own Your Privacy

Learn how to review privacy settings for Google Calendar (bCal), Google Groups (bConnected Lists), and Google Drive (bDrive). 

Click on the image(s) to download the pdfs.

Celebrate Data Privacy Day 2020

January 6, 2020

What's Data Privacy Day?

Champion Badge

Preventing Social Engineering Attacks

August 18, 2020
Social Engineering criminals focus their attention at attacking people as opposed to infrastructure. Social engineering begins with research; an attacker may look for publicly available information that they can use against you. These attacks can come in a variety of formats: email, voicemail, SMS messages, DMs, or via social media and attempt to prey on your respect for authority, courtesy, or trust.

Data Privacy Day 2021

January 28th is Data Privacy Day

We’re not going to lie, keeping your digital privacy secure is a task that requires some ongoing maintenance. This year, we are encouraging everyone to “Own Your Privacy,” by providing the resources linked below. 

Data Privacy Videos 2021

Short videos for protecting your privacy online  

Too busy to read our articles? Here are three, short videos to give you some tools to help you "Own Your Privacy."

Data Privacy Day Posters 2020

Only You Control Your Online Presence

Below are poster (11" x 17") and flyers (8.5" x 11") you can use to learn how to protect yourself from cyber criminals. 
Click on the image(s) to download the pdf.

Data Privacy Videos 2020

Short videos to educate you on protecting
your privacy online  

Too busy to read our articles? No problem! Here are three, short videos to give you some tools to protect yourself from cyber criminals while living and working online.

Security Basics: 101

The basics of campus information security boil down to the following three concerns:  Protecting Yourself, Protecting Devices, and Protecting Data

Protecting Yourself

Protect your personal information by following guidelines for managing passwords, learning how to avoid phishing scams, and by remembering secure computing practices at all times.