July/August 2014: Traveling securely

When you travel—for vacation, business, research, or any other purpose—remember to protect any personal or confidential information you have with you.

Read more...

How to prepare for your trip

While you’re planning what clothes to pack and checking your airline and hotel reservations, don’t forget to think about the security of any digital information or mobile devices with which you will travel.

What to do while traveling

While you are abroad, here are some things you should do to keep your information and devices secure.

What to do upon returning from your travels

The first thing most people want to do when they return home from a trip is relax. However, there are a few final steps you need to take to maintain information security.

June 2014: Understanding Social Engineering

It is far easier for hackers to gain access to systems by simply asking for it. Through the process of social engineering, hackers bypass security systems by deceiving their victims into taking certain actions or surrendering certain information.

What Is Social Engineering?

It’s often said that social engineers use our human nature against us. They manipulate our trust in order to get us to do what they want, whether that’s surrendering our personal information or taking actions that put us at risk.

Security Spotlight: Phishing

A successful phishing attempt can result in the compromise of your personal information, your important accounts, and even your devices. Links and attachments can deliver malware to your device. That malware can harvest your information, make your device vulnerable to further attacks, and even give the phisher control of your device.

A Graphical Look at Social Engineering

Did you know that the most common phishing attacks mimic banking institutions? Learn more about social engineering and phishing from this infographic.

May 2014: You and Your Passwords

As part of our overall information security policy, the University of Delaware requires that you use strong passwords. Strong passwords are vital to information security: they protect your accounts and information from unauthorized access and use.

What makes a good UDelNet password?

UDelNet accounts have access to University information and computing resources, which means they are prime targets for hackers. Every individual at the University is responsible for his or her own account, including the password to that account.


You are a target. Information security is everyone’s responsibility.