Getting Started with Information Security

Getting Started with Information Security

Welcome to information security at the University of Delaware!

Information security is based on our shared responsibility to protect IT resources—University information and IT devices—against security threats. These threats can be digital or physical, and insufficient security can lead to great monetary, legal, and reputational damage to the University and the individuals whose data it manages.

How to get started

Review the information on this page to get a sense for the most basic security needs: securing computers, securing mobile devices, securing data, and being aware of threats.

To learn more about the specific recommendations and requirements, follow the links to the Secure UD Essentials and Best Practices sections, which will explain what you need to do to protect computers, mobile devices, data, and yourself from cyber threats.

At a very basic level, securing your data, your devices, and yourself takes four steps:

  1. Secure your computer
  2. Secure your mobile devices
  3. Secure your data
  4. Keep yourself aware

If you're a unit head or unit IT staff member, you can get your unit started with the essentials of Secure UD, including securing your unit's devices and data. Contact IT Security for a consultation.

Step 1: Secure your computer

Quick start: Security essentials for computers

For most students, faculty, and staff, security begins with their computer. We use computers for almost everything work or study related, and we need to be able to securely conduct our activities without a lot of extra hassle.

The essential computer security practices are designed to create a secure foundation for your work, study, and recreational use. Once you set your computer up securely, the system can do a lot of the work for you.

Step 2: Secure your mobile device

Quick start: Security essentials for mobile devices

With the digital world becoming an increasingly mobile affair, many students, faculty, and staff are relying on smartphones and tablets for daily tasks. They're useful for checking email, communicating with others, managing your daily tasks, banking or shopping on the fly, and more.

But because they're portable and full of your personal data, they're also at risk for theft and misuse. The essential mobile device security practices are designed to help you protect your mobile devices and all of the data they store.

Step 3: Secure your data

Quick start: Security essentials for data

Data drives everything in the digital world. Everyone has and uses personal and sensitive information for tasks such as banking, managing healthcare, shopping, and working. Whether the data belongs to you or to the University, you have a duty to protect it—and yourself—from harm.

Follow the essential data security practices to safeguard data against cybercriminals who would misuse it to commit identity theft, fraud, or other harm to you and the University.

Step 4: Keep yourself aware

Quick start: Security essentials for awareness
Quick start: Best practices for computer and information security
Quick start: Secure UD Threat Alerts blog
Quick start: Secure UD Training

In order to stay safe, you need to stay informed.

  • Be aware of threats and best practices and make conscious choices that protect data and devices.
  • Explore the best practices for information security to learn more about what steps you can take to protect your personal information and devices and the University's IT resources.
  • Visit the Secure UD Threat Alerts blog to stay up-to-date on the latest phishing scams and vulnerabilities impacting the University community.
  • If you're a faculty or staff member, take Secure UD Training to improve and maintain your awareness of cyber threats and how to avoid them.