Cybersecurity: DePaul Security Training Videos


Make sure that all of your computing, browsing, and digital communications are secure. Please take a few minutes to review the following videos that will help protect you from cyber attacks. Just a handful of proactive steps can help to ensure that DePaul students maintain a safe computing environment.


Introduction to Cyber Security

DePaul's Information Services is proud to present a cyber security guide. Learn about phishing, passwords, browser safety, protecting your personal devices, and responding to identity theft. Please watch the following videos to be better prepared for security threats.

Security Training Videos

Introduction

Please watch this series of videos and be better prepared for potential cybersecurity threats.


Phishing

A phishing attack is an attempt to socially engineer a user into unknowingly giving up sensitive information. This sensitive information can be used to access user account(s), and steal identities.


Passwords and Authentication

Using strong passwords and multi-factor authentication can strengthen your security stature.


Web Browsers and Browsing Safety

Securing your browser and browsing the web can help keep you safe!


Protecting Personal Devices

Keeping your devices secure and free from malware is critical.


Responding to Identity Theft

Identity theft is a serious issue. Learn more to be prepared.


Outro

Thank you for watching this video series. Please watch this outro for more resources available to DePaul students regarding cybersecurity.


DePaul Security Training - Plain-text content

Phishing:

Being able to identify and phishing attempts can help keep you safe online!

A phishing attack is an attempt to socially engineer a user into unknowingly giving up sensitive information. This sensitive information can be used to access user account(s), and steal identities. The attacker pretends to be an individual, group, or organization that can be trusted:

The attacker may prompt a user to click on a hyperlink. The attacker may attempt to hide the effective URL.

The associated link will be malicious

The attacker may prompt user to open/save/run an attachment. The associated attachment will be malicious.

Other key indicators of potential phishing


Passwords/Authentication:

Using strong passwords and multi-factor authentication can strengthen your security stature!

Passwords should be complex

  1. Passwords should be at least 8 characters long.
  2. Passwords should contain a mixture of upper case and lower case characters.
  3. Passwords should contain a mixture of letters and numbers.
  4. Passwords should special characters/symbols (when possible).
  5. Passphrases (a password made of a long sentence) can help strengthen passwords and improve your ability to remember them.
  6. Consider replacing letters with their equivalent numerical representations.
  7. Passwords should not contain any sensitive information.
  8. Passwords should not contain easily guessable information.
  9. Consider changing passwords on a regular basis.

Passwords should be unique

Password Management: consider using a secure password manager

Two-Factor and Multi-Factor Authentication


Browser/Browsing Safety:

Securing your browser and browsing the web can help keep you safe!

By default, browser settings may not be ideally secure, but can be configured.

Browsers can also usually be configured to be even more secure

User should verify that their connection is secure

Determining if a site is safe

Check for spoofing

If a website is deemed to be potentially insecure users should try to find an alternative: big name online retailers or brick and mortar stores as an alternative to lesser known, potentially suspicious retail sites (if deemed insecure).

Safe posting habits

Public Machines and Access

Use caution when connecting to unknown Wi-Fi networks or hotspots


Host Based Security:

Keeping your devices secure and free from malware is critical!

Computers are targets

Securing the Operating System

Securing third-party software

Anti-Virus

Common signs and symptoms of malware

Accidents can happen


Responding to Identity Theft:

Identity theft is a serious issue, learn more to be prepared!

Prevent Further Issues

Place a fraud alert with one of the three major credit bureaus 

Additional Responses to Identity Theft

  1. Check credit report.
  2. Report the theft to the FTC.
  3. Report the incident to the local police department. This may be the Sheriff's office.
  4. For more information, visit: identitytheft.gov.

Learn more about Cyber Security

For more info or any additional questions contact the Help Desk at 312-362-8765 or helpdesk@depaul.edu.