Penn Computing

Penn Computing

Computing Menu Computing A-Z
Computing Home Information Systems & Computing Penn

 

Tuesday, September 2, 2014

 
  New Resources
Travel Tips for Data Security
Free Security/Privacy Training Resources
Penn+Box
Two-step verification
Combating Malware
SafeDNS
Phishing Archive
Cloud Computing and Data Outsourcing
Best Practices for Applications with Confidential University Data
 
  Security "Greatest Hits"
Managing Passwords
E-mail Harassment & Forgery
Hoaxes, frauds & scams
Spam
Phishing
Wireless Networking
Encryption & digital signatures
 
  Best Practices
Secure desktop computing
Secure servers
Secure data deletion
Securing printers
Tips for safe computing
Computing policies
 
  More in-depth information for
Local support providers
System administrators
 
  Security initiatives
Critical host compliance
Authentication & authorization
Penn Security & Privacy Assessment (SPIA)
Security Liaisons (Restricted Access)
Secure Share
Secure Space
Vulnerability Scanner
 
  Related links
Electronic privacy
PennKey
Viruses
Worms, trojans, backdoors

One-Step-Ahead Tips: Receive New Tips by Email

To receive new One-Step-Ahead tips delivered to your email inbox, send an email to

listserv@lists.upenn.edu with the following message in the body:
SUBscribe one-step-ahead

This list is for publishing One-Step-Ahead security and privacy tips only.
If you have questions, contact security@isc.upenn.edu

To unsubscribe from the list, email the following text: "unsubscribe one-step-ahead" to listserv@lists.upenn.edu
Note: you must send unsubscribe email messages from the same email account that you are subscribed to the list under.

Last updated: Wednesday, January 30, 2008

top

Information Systems and Computing
University of Pennsylvania
Comments & Questions


Penn Computing University of Pennsylvania
Information Systems and Computing, University of Pennsylvania