-
From Stefanie Clerkin
0 0 likes | 19 19 plays(InfoSec 101) Managing passwords can be difficult, but a secure password manager can help you be more efficient by generating, remembering, organizing, and filling in… -
From Stefanie Clerkin
0 0 likes | 44 44 plays(InfoSec 201) Organizations look at their cybersecurity threats by identifying, analyzing, evaluating, and addressing risks. By assessing these risks, they can establish… -
From Stefanie Clerkin
0 0 likes | 60 60 plays(InfoSec 101) Managing passwords can be difficult, but a secure password manager can help you be more efficient by generating, remembering, organizing, and filling in… -
From Stefanie Clerkin
0 0 likes | 12 12 plays(InfoSec 101) Most of us receive a large volume of email and instant messages, often scanning through hundreds a week. These numerous online communications make us… -
From Stefanie Clerkin
2 2 likes | 231 231 playsCheck out this 5-minute video about 10 back to school cybersecurity safety tips. -
From Stefanie Clerkin
3 3 likes | 437 437 playsThis series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important… -
From Stefanie Clerkin
0 0 likes | 29 29 playsCheck out this 6-minute video about sending files securely at Princeton and at home. For a deeper dive into this topic, please check out our webinar: Sending Files… -
From Stefanie Clerkin
0 0 likes | 48 48 plays(InfoSec 201) You’ve been asked to send personal information to your lawyer’s office, doctor’s office, or another trusted organization. Do you ever get… -
From Tara Schaufler
2 2 likes | 101 101 playsCheck out this 4-minute video about social engineering scams.The Simply Security series of short videos answers frequently asked information security questions and… -
From Stefanie Clerkin
0 0 likes | 69 69 plays(InfoSec 101) Managing passwords can be difficult, but a secure password manager can help you be more efficient by generating, remembering, organizing, and filling in… -
From Stefanie Clerkin
2 2 likes | 143 143 playsThis series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important… -
From Irene Kopaliani
1 1 likes | 41 41 playsThis presentation guides the researcher through various data use agreement requirements, including testing, approval, and storage/analysis; provides tips on managing… -
From Stefanie Clerkin
0 0 likes | 14 14 playsAs we enter 2022, we look back at the state of information security over the past few years. Coronavirus scams, the natural gas pipeline ransomware attack, foreign… -
From Tara Schaufler
0 0 likes | 230 230 playsThis series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important…