Welcome Back!
Boundaries Refresh your boundaries in the new school year. Boundaries can help you plan and communicate your response to what other people say or do and will help immensely when shutting down social engineering criminals. If someone calls trying to get in touch...Education, videos, and prizes, oh my!
Secure UD Education Completion 2022 We are pleased to report that over 40% of enrolled users completed the Secure UD education program last fiscal year. This represents a significant improvement from the 21% completion rate from 2021. Keep up the good work, Blue Hens!...Secure UD News: May 2023 Edition
In this edition: learn about the tech request process, new tips for staying secure, and how to win prizes for completing your Secure UD training.
Working Remotely and Securely
Working remotely offers many benefits, such as flexibility, convenience, and more family time, but it also poses many risks for network security.
Third Party Risk Management and the Tech Request process
How does UD work to minimize third party risk with our technology? Third Party Risk Management is a key step in the University’s Technology Request protocol that reviews and verifies several factors for every technology purchase to help keep our data secure, our personal privacy protected, and our systems unexploited.