May 18, 2023 | Newsletter, Uncategorized
How does UD work to minimize third party risk with our technology? Third Party Risk Management is a key step in the University’s Technology Request protocol that reviews and verifies several factors for every technology purchase to help keep our data secure, our personal privacy protected, and our systems unexploited.
Apr 18, 2023 | Uncategorized
If you’re reading this, you may have spotted April’s phishing test email! As always, you should forward this, or any other suspicious or questionable email, to reportaphish@udel.edu. Even if you click on a phishing link, always report the message. When it’s a UD...
Mar 23, 2023 | Uncategorized
If you’re reading this, you may have spotted March’s phishing test email! As always, you should forward this, or any other suspicious or questionable email, to reportaphish@udel.edu. Even if you click on a phishing link, always report the message. When it’s a UD...
Feb 15, 2023 | Uncategorized
If you’re reading this, you may have spotted February’s phishing test email! As always, you should forward this, or any other suspicious or questionable email, to reportaphish@udel.edu. Even if you click on a phishing link, always report the message. When it’s a UD...
Jan 24, 2023 | Uncategorized
In 2022, UD Information Technologies (UDIT), with the support of departmental IT professionals, deployed Crowdstrike Falcon, an enhanced Endpoint Detection and Response (EDR) solution across all UD-owned laptops and desktops. This initiative is part of a...
Jan 24, 2023 | Uncategorized
Regardless of how you feel about social media—if you’re an avid user or barely touch it—we all know that the more you post, the more information is available about you online for others to see. In addition, many of the social media apps can “harvest” data from the...