Cybersecurity

Cybersecurity


An icon of a fishing hook

Avoiding Phishing Attempts

Phishing is when someone lies in order to obtain your personal information. Here's what to look out for. >>

An icon of a lock and key

Three Simple Steps to Cybersecurity

Follow these basic rules to help protect your personal information and devices. >>

A blue shield icon

Employee Cybersecurity Training

Cybersecurity awareness training gives employees a working understanding of basic cybersecurity principles and precautions. >>

Duo Two-Factor Authentication

Duo Two-Factor Authentication

Duo provides two-factor authentication which provides a second layer of security to your accounts. >>

An icon of a computer with a lock on the screen

Protect Your Account

Make sure you're signed out of all single-sign on services. >>

An icon of a disk with a lock

Disk Encryption

Whole disk encryption adds another layer of protection for your data if your computer is lost or stolen. >>

A blue shield icon

Microsoft Defender for O365 Email Protection Service

Microsoft Defender for O365 Email Protection Service is an AI-driven email filtering service. >>

A circle with 1st inside

Cybersecurity Video Contest

Wheaton College students create short videos about cybersecurity for the chance to win prizes. >>

Protecting Our Information: Cybersecurity at Wheaton College