Cybersecurity Awareness Month

Cybersecurity Awareness Month — Don’t Give Hackers a Treat

What is data privacyData Privacy?

Data privacy is about controlling who has access to your personal information — from your grades and medical records to your location and social media activity. Protecting privacy isn’t only about avoiding scams; it’s about keeping your identity, reputation, and even your safety secure. Learn more about why data privacy matters.

Oversharing is like handing candy to hackers — they love free information. This week is all about Privacy: locking down your data so it’s harder for attackers to get a treat at your expense.

🍬 Easy wins for privacy (takes just a few minutes)

  • Protect university data. Never post or share FERPA-protected information, PII, or HIPAA data (like student grades, IDs, or health records) in email, apps, social media — or public AI tools. Always keep sensitive information in approved university systems.
  • Be smart with social media. Adjust your privacy settings to limit who can see your posts, friends list, and tagged photos. Avoid sharing real-time updates about travel or events and always ask before tagging friends or posting about others.
    • Control your devices. On iPhone or Android, review which apps can access your camera, microphone, contacts, and location — then turn off anything unnecessary. Keep location sharing off unless an app truly needs it, so you’re not broadcasting your whereabouts 24/7.
    • Check your account settings. Take a few minutes to review privacy and security options in accounts like Google, Microsoft, or Apple. You can limit what is shared, see what devices are connected, and make sure only the right people have access.

    Need help finding where to update your settings? The National Cybersecurity Alliance has gathered direct links to privacy controls for all major platforms — explore them here.


    🔒 Week 2 Challenge: 2 Minutes of Privacy

    Your challenge this week is simple: pick one quick privacy step from the list above and complete it. For example:

    • Remove an app’s access to your location.
    • Update your social media profile so only friends can see your posts.
    • Turn off microphone access for an app you don’t use.
    • Review your account settings to limit what is shared.

    Email what you did to oitsecurity@smu.edu with the subject “Week 2: 2 Minutes of Privacy” to earn your points!


    🧩Wordle of the Week

    How to earn points:

    * One submission per person, per week.


    🕸Missed Last Week?

    Catch up on past cyber tricks, challenges, and Wordles — see what you missed!


    🏆Cyber Heroes of the Week

    Congrats to this week’s top point earners!

    1. Sophia Groth
    2. Mateo Langston Smith
    3. Becca Woolsey
    4. Jomita Fleming
    5. Ricki Ward

    Keep completing challenges and sending in your submissions — your name could be here next week!


    🎃 Cyber Fair is coming!

    Join us on October 29 in Moody Atrium for food, fun, and cyber treats.
    Save your spot

    Published by

    Corrina Taylor

    Corrina Taylor is the Chief Information Security Officer (CISO) at SMU’s Office of Information Technology, bringing nearly a decade of hands-on experience in cybersecurity. With a strong foundation in information assurance and a track record of building global security programs from the ground up, Corrina specializes in aligning cybersecurity with business strategy, regulatory compliance, and risk management. She holds a Master’s in Information Security Engineering from the SANS Technology Institute and multiple industry certifications, including CISSP and SANS GIAC. Corrina is passionate about fostering resilient security cultures, leveraging emerging technologies, and empowering teams to stay ahead of evolving threats.