Security Training

This October as a part of Information Security Awareness Month we are offering an online training for SMU Faculty and Staff. The training only lasts about 30 minutes; however, it is filled with valuable information that can help protect you and the University. Below are some of the topics covered in the training. You are our best defense. Are you prepared?

threat-icon

Social Engineering– Many of today’s most common cyber-attacks are based on social engineering. As such, we explain what social engineering is, how attackers fool people and what to look out for. We show how you can detect these attacks and respond to them.

email-iconEmail and IM- One of the primary means of attacks and exploitation is through email in both simple or large scale attacks and targeted spear phishing attacks. We explain how these attacks work, including recent examples of phishing, spear phishing, malicious attachments and links, and scams. This video shows how to detect these attacks, respond to them, and use both email and IM securely.

file-sharing

Social Networking- Sites such as Facebook, Twitter and LinkedIn have exploded in popularity, with employees and managers sharing all sorts of private information, not only about themselves but about their work. Cyber attackers know this and use this information for identity theft, spreading malware, scams and even targeted attacks. We discuss these risks and the steps you can take to protect yourself and SMU.

Mobile Devices- Today’s mobile devices are extremely powerful, including tablets and smartphones. In most cases these devices have the same functionality, complexity and risks of a computer, but with the additional risk of being highly mobile and easy to lose. We cover how to use mobile devices safely and how to protect the data on them.

security-Training-and-EdWi-Fi Security– This section discusses the risks of public Wi-Fi and steps that you can take to protect yourself. In addition we cover that only authorized Wi-Fi access points with prior management approval can be deployed within SMU.

Telecommuting Working Away from Home- Many SMU employees are no longer working at the office, they work from home or on the road while traveling. There are unique risks for the telecommuter. This module focuses on how these employees can protect themselves and SMU, including laptop security and creating a secure, mobile working environment.

Security-Icon

Physical Security- While physical attacks against your data are less likely to happen, when such incidents do occur they can have a greater impact on your organization. In this module we explain how attackers will attempt to trick and fool their way into restricted areas. We also discuss how you can protect the physical security of your facilities, including enforcing use of SMU-issued identification badges.

Hacked- No matter how effective a security team and their processes are, there will be incidents. This module focuses on how you can help by identifying and reporting an incident. We cover things to look for, such as suspicious activity or virus alerts and whom to report an incident to.

Faculty and staff can login to courses.smu.edu with their SMU credentials to access the training.

Last Week of Information Security Awareness Month

Info-Sec-2013-web-slide

This is the last week of Information Security Awareness month. All training content is posted within Blackboard to simplify the process. It requires about 30 minutes to complete the course. However, you do not have to complete all the videos in one sitting.  Most of the videos are just a few minutes long. The training will remain available after the end of this month; however, we encourage you to take the training as soon as possible, especially if you use sensitive information like credit cards or social security numbers in your day to day activities.

To complete the training:

1. Visit https://courses.smu.edu.
2. Login with your SMU ID and password.
3. Locate the Security Awareness 2013 course in the My Courses section.
4. Click on the tutorial you wish to preview.  Blackboard will remember which ones you have completed and which still remain.
5. Complete the 3 question quiz at the end of each tutorial.

Later this fall, the training will be uploaded to your training transcript in Access.SMU.

Where’s My Volume?

by Adam Jones

In the Classroom Support office we get a lot of phone calls from professors who are having trouble setting the volume in their rooms. Since this comes up so often, I’ve decided to write a guide to help you.

While this might seem simple to experienced computer users, it is still confusing to others. (Which is exactly how I feel when my father tries to explain what an intake manifold does. No idea.) For those of you who have trouble with sound settings, just follow these instructions, and you’ll know what to do. Continue reading Where’s My Volume?

Making Windows 8 Feel Like Windows

shell start

By Robert Burkett

If you bought a new computer in the last 6 months to a year, it probably came with Windows 8 pre-installed. For those who have been using Windows for any length of time, it’s likely been a frustrating experience to navigate compared to all previous versions of Windows. If your new computer is not touchscreen, it makes even less sense. You may get used to it, or you may scream… either way, there is hope to make it feel more like Windows.

A couple add-ons from www.classicshell.net with their Classic Start Menu and Explorer really help bring back that familiar environment that you can’t live without. I suspect Microsoft will eventually add these features within Windows 8 with future updates, but until then (or not), the Classic Shell is more than sufficient.

classic explorer