First things first. All active employees at the university are required to comply with university information security policies. You can access and read them by visiting the university Policy Library.
Cybersecurity training programs as implemented today by most large companies do little to reduce the risk that employees will fall for phishing scams–the practice of sending malicious emails posing as ...
Beards, body fat, and cyber refreshers now frowned upon Cybersecurity training, beards, and body fat have something in common ...
The technological developments that have fueled innovation in health tech are accompanied by challenges that need to be addressed if their potential is to be fully realized. Few areas of healthcare ...
LinkedIn Corp. will resume training its generative AI models on information about non-US users after a nearly year-long halt ...
The National Auto Auction Association and KAR Global said in a joint statement Tuesday that KAR is licensing its “Privacy Pam” privacy and security training ...
Protecting the confidentiality of the personal data entrusted to us by our customers, employees, and business partners is of utmost importance to us. That’s why we take proactive approaches to keep ...
Understanding how information security impacts you while you are at UB is very important. The Information Security Office makes a variety of awareness materials available both electronically and in ...