University of Delaware

Secure UD News May 2023
 

In this edition, read the latest about major security breaches around the world, how de-identified data works, prize winners from 2022's Secure UD training, tips for staying secure as we return from summer, and insightful travel observations from our CISO, Andy Weisskopf.


Major Security Breaches

694 data breaches have been publicly disclosed through July of 2023. Curious about the latest breaches and how you might be impacted?

Learn more about 2023’s data breaches.

 

Education, videos, and prizes, oh my!

This year we’ve started rewarding good cyber behavior by introducing prizes for completing your Secure UD Education, as well as forwarding the monthly phishing challenge to reportaphish@udel.edu.

Are you part of the 40% of enrolled users who completed the 2022 education program? If not, you can still complete your 2023 modules for a chance to win! And, check out season 2 of Restricted Intelligence–a new episode will be released each month starting in September.

See who won in 2022.

 

Welcome Back!

We hope that you had a refreshing summer, complete with new memories, fireflies, adventure, and ice cream! UDIT Information Security is here to help you reset for the new semester with tips on boundary setting, awareness, digging through your vacation email, and more.

See how you can be more secure this year with these good habits.

 

De-identifying Personally Identifiable Information: Unlocking Additional Value

Data privacy laws restrict how personally identifiable information (PII) can be used and for what purposes. When PII is de-identified, however, the resulting data can be used for other purposes because it is no longer identifiable as to any one person. De-identified data can offer insight to general operations, efficiencies, outcomes, trends, services, outreach, and a host of other data points.

Learn about the value of de-identified data and how it informs our data privacy policies, and much more.

 

What’s the CISO reading?

"Over the last few months, I’ve been reading many travel books to prepare for my family vacation. While on that vacation, my son started an interesting conversation about social conventions—those unwritten rules we all follow to get along—and how they’re different in other countries. We identified a number that were different from ours in the places we visited. But those same social conventions are what social engineers use against us and that we have to guard against. Our desire is to be polite and helpful but I promise I won’t ever ask anyone to buy gift cards because I’m stuck in a meeting—and I hope you’ll be skeptical of anyone else asking you to do so.

I also pulled out a film from the 90’s to watch - The Net (1995), starring Sandra Bullock. The movie covers a lot of topics that are still relevant almost 30 years later: remote work, online banking, and, of course—hacking."

--Andy Weisskopf, Chief Information Security Officer


 
Secure UD Logo