Skip to main content

Keep Security Your Top Priority

Image of Secure Northwestern logo

Think software updates aren't worth the time? Or that all phishing scams are easy to spot? Think again. Security compromises happen every day, and can happen to anyone—including you.

Keep your digital security and personal information secure; learn how to protect yourself when it comes to mobile devices, secure passwords, phishing scams, and more with help from Northwestern IT and a host of security resources that are right at your fingertips.

Phishing

Get a refresher on how to identify a phishing email. See a list of the most recent phishing scams received at the University. Scam Email Attempts at Northwestern.

Anyone can fall victim to a scam. If you click on a malicious link or share your password report it immediately! Email security@northwestern.edu.

Data Security

Desktop/Laptop Encryption
Prevent and protect information from accidental data loss and ensure your desktops and laptops are protected again unauthorized access. 

Protect Your Research Environment
Send,  store, and back up research data securely. 

Secure Your Working Environment
It's everyone's responsiblity to comply with University policy and to use Northwestern's security resources to help ensure the safe and secure operation of the network and conduct of University business. 

Before You Leave Campus

Stay secure when traveling off campus for business or pleasure. Remember to Use Northwestern VPN on your laptop, smartphone, or tablet to create an encrypted connection to University resources. You can also connect securely by using the eduroam network at participating institutions. 

Unencrypted connections may put your communications at risk. Tips for Staying Secure During Travel.

Want one of these eye-catching flyers for your residence hall, office, or lab? Simply download, print, and post! Watch for more options as the campaign progresses.  Larger posters are also available by contacting IT Communications.

Image of cybersecurity poster for phishing     Image of cybersecurity poster for data

Last Updated: 10 October 2017

Get Help Back to top