-
From Stefanie Clerkin
0 0 likes | 37 37 plays(InfoSec 101) Managing passwords can be difficult, but a secure password manager can help you be more efficient by generating, remembering, organizing, and filling in… -
From Stefanie Clerkin
0 0 likes | 47 47 plays(InfoSec 201) Organizations look at their cybersecurity threats by identifying, analyzing, evaluating, and addressing risks. By assessing these risks, they can establish… -
From Stefanie Clerkin
0 0 likes | 60 60 plays(InfoSec 101) Managing passwords can be difficult, but a secure password manager can help you be more efficient by generating, remembering, organizing, and filling in… -
From Stefanie Clerkin
0 0 likes | 13 13 plays(InfoSec 101) Most of us receive a large volume of email and instant messages, often scanning through hundreds a week. These numerous online communications make us… -
From Stefanie Clerkin
2 2 likes | 231 231 playsCheck out this 5-minute video about 10 back to school cybersecurity safety tips. -
From Stefanie Clerkin
3 3 likes | 446 446 playsThis series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important… -
From Stefanie Clerkin
0 0 likes | 36 36 playsCheck out this 6-minute video about sending files securely at Princeton and at home. For a deeper dive into this topic, please check out our webinar: Sending Files… -
From Stefanie Clerkin
0 0 likes | 51 51 plays(InfoSec 201) You’ve been asked to send personal information to your lawyer’s office, doctor’s office, or another trusted organization. Do you ever get… -
From Tara Schaufler
2 2 likes | 108 108 playsCheck out this 4-minute video about social engineering scams.The Simply Security series of short videos answers frequently asked information security questions and… -
From Stefanie Clerkin
0 0 likes | 71 71 plays(InfoSec 101) Managing passwords can be difficult, but a secure password manager can help you be more efficient by generating, remembering, organizing, and filling in… -
From Stefanie Clerkin
2 2 likes | 147 147 playsThis series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important… -
From Irene Kopaliani
1 1 likes | 43 43 playsThis presentation guides the researcher through various data use agreement requirements, including testing, approval, and storage/analysis; provides tips on managing… -
From Stefanie Clerkin
0 0 likes | 14 14 playsAs we enter 2022, we look back at the state of information security over the past few years. Coronavirus scams, the natural gas pipeline ransomware attack, foreign… -
From Tara Schaufler
0 0 likes | 232 232 playsThis series of short videos answers frequently asked information security questions and shares insights from professionals in the field. Join us as we ask the important…