Third Party Risk Management and the Tech Request process

How does UD work to minimize third party risk with our technology? Third Party Risk Management is a key step in the University’s Technology Request protocol that reviews and verifies several factors for every technology purchase to help keep our data secure, our personal privacy protected, and our systems unexploited.

Did you spot April’s Secure UD phishing test?

If you’re reading this, you may have spotted April’s phishing test email! As always, you should forward this, or any other suspicious or questionable email, to reportaphish@udel.edu. Even if you click on a phishing link, always report the message. When it’s a UD...

Did you spot March’s Secure UD phishing test?

If you’re reading this, you may have spotted March’s phishing test email! As always, you should forward this, or any other suspicious or questionable email, to reportaphish@udel.edu. Even if you click on a phishing link, always report the message. When it’s a UD...

Did you spot February’s Secure UD phishing test?

If you’re reading this, you may have spotted February’s phishing test email! As always, you should forward this, or any other suspicious or questionable email, to reportaphish@udel.edu. Even if you click on a phishing link, always report the message. When it’s a UD...

Social Media and Privacy

Regardless of how you feel about social media—if you’re an avid user or barely touch it—we all know that the more you post, the more information is available about you online for others to see. In addition, many of the social media apps can “harvest” data from the...