Information Security Training FAQ
The cybersecurity of the University depends on you as a user—what you know and the decisions you make based on what you know. Your daily decisions about email, passwords, and whom to trust — strengthen or weaken organizational cybersecurity. A system-wide attack can be launched through your computer or account, if compromised, and can give cyber attackers access to the University’s networks and systems.
The University’s Information Security Training course “Core Information Security Awareness” provides guidance to help you remain safe while using the internet and the University’s networks and systems. Security training is important as awareness and understanding improves day-to-day decisions-making which can lessen your chances of falling victim to ransomware attacks, phishing scams, hacking, and the like. This ultimately better protects everyone at the University and decreases the chances of data loss, ransom for restored rights, or other breaches.
This page provides answers to the most asked questions relating to the training.
How much time is there to complete the Information Security Training course?
What can be expected from the Information Security Training course?
The training course consists of several interactive training modules designed to familiarize you with key information security concepts and best practices. Topics include ransomware, email protection tools, and password management.
How long will it take me to complete the Information Security Training course?
How can a manager determine whether a staff member has completed the required Information Security Training course?
The Information Assurance team in Information Security can provide this information upon request. Email firstname.lastname@example.org.
Who should I contact if I have any questions about the Information Security Training course?
You may send email to email@example.com.
I am having difficulties accessing the training. Who should I contact to help?
Please email firstname.lastname@example.org to help with any technical issues related to the training.
What if I require special accommodations?
If you need a reasonable accommodation to complete the online course, please contact Equal Opportunity Programs at email@example.com or 773.834.OEOP (6367).
I am a unit leader. How will I know who hasn’t completed the training?
Please email firstname.lastname@example.org. Daily completion reports are available to unit administrators upon request through Box. Reports have been made available to unit IT leadership and HRPs.
How can I help my unit complete training?
Please email email@example.com. Daily completion reports are available to unit administrators upon request through Box. You can use these reports to send out tailored reminders to staff and management in your unit.