Security & Policy Articles Secure Computers and Mobile Devices Resources for Cybersecurity Training and Attestation Biometrics and Your Privacy Set Up Biometrics on Your Device Data Hygiene Best Practices Dispose of High Risk Data Encrypt Computer (Required for Confidential Data) Recognize Possible Security Problems Tips to Minimize IT Security Risks Travel Internationally with Technology Security Practices When Working from Home Cryptocurrency Mining, Security, and University Policy