Resources for Cybersecurity Training and Attestation
This article applies to: Faculty , Security & Policy , Security Training and Compliance , Staff
Cornell's Cybersecurity Training and Attestation (ITSO 102) for faculty and staff reviews how to protect your Cornell data and systems against the latest security threats.
Get Help When You Need It
- Request help with ITSO 102 Cybersecurity Training and Attestation, including trouble accessing the training, or concerns with your completion status or login restriction
- If you have other kinds of questions or concerns, contact the IT Service Desk or your local support group.
- For help with security issues, including if you think your data has been compromised, contact the IT Security Office.
- If you feel you are in immediate physical danger, contact the Cornell Police (607-255-1111) or your local police department.
Protect Your Password
- Enroll in Secure Connect to make login easier and more secure.
- Enable two-factor authentication for your NetID using Duo.
- Manage complex passwords with a password manager protected by two-factor authentication.
- Check for data breaches at "have i been pwned?"
Protect Your Devices
- For data protection and backup, enroll your Cornell devices in Certified Desktop. (Look up your devices to see if they already are.)
- When traveling internationally, register your travel in the Travel Registry. You may also qualify for secure laptops and data protection through the High Risk Travel Loaner Program.
- Need to securely destroy hardware that may contain sensitive data? Search for confidential shred days.
- Cornell offers a no-fee service for media destruction.
- Learn when to ask for a Security Exception for your device.
Protect Your Data
- To better understand which tech tools are appropriate for sending, storing, and sharing information, consult the Regulated Data Chart.
- When working remotely with high-risk data, use Cornell's Virtual Private Network (CU VPN).
- When traveling to other institutions, access the internet with eduroam.
- Find secure data storage options for faculty.
- Securely share information through Cornell's secure file transfer.
Check Emails for Fraud
- Does an email seem too good to be true? Check whether it's real using the Cornell Phish Bowl.
- Check to see if an email from Cornell is real with Verified Cornell Communications.
- Learn how to spot phishing messages.
Cybersecurity Policies
The policies listed here include information about your responsibilities as a Cornell University employee:
Comments?
To share feedback about this page or request support, log in with your NetID