• avatar

    Share This:

    • Share on Facebook
    • Share on Google Plus
    • Share on Linkedin
    • RSS
    « Back to Blogs
    May 2018

    New Course Added to Data Security Suite! Data Security: Passwords Now Available

    As news media continue to report data breaches involving sensitive information, it is essential for colleges and universities to have a strategy to protect their student and staff data. One way to help mitigate some of these risks is to ensure that those connected to your network have strong passwords in place. While many systems and websites provide their own rules and guidelines for creating strong passwords, some of the top 10 most common passwords retrieved from security breaches in 2017 could be easily guessed, including "123456," "password," and "letmein."

    Do any of these passwords sound familiar? EduRisk's latest online course, Data Security: Passwords can help.

    The latest offering in our Data Security series, this 10-minute course gives learners a high-level overview of passwords and provides practical tips for ensuring security. After taking this course, learners will understand:

    • What makes a good password
    • Best practices for using passwords
    • The importance of creating a unique password for each website
    • What password managers are and how they work
    • The basics of multifactor authentication

    Don't allow a weak password to enable sensitive school data to fall into the wrong hands. Get ahead of the problem by rolling out this online training today!

    Just learning about our Data Security courses?

    Take advantage of our current suite of offerings by rolling out all Data Security courses on your campus! Additional courses include:

    Data Security: Malware - Malware is any software that is designed to perform actions on a user's computer or network without that user's consent of knowledge. This course provides a high-level overview of related risks and practical tips for avoiding malware.

    Data Security: Phishing - Phishing is the act of impersonating a reputable source, generally via email, in order to get individuals to reveal sensitive information, such as passwords. This course discusses phishing scams an how to avoid them.


    Add Comment

    Text Only 2000 character limit

    Page 1 of 1