Skip to main content
Visit Remote Work Tools & Guidelines and Student Remote IT Support for details on working remotely under the University's Coronavirus (COVID-19) recommendations
Penn Information Systems & Computing Systems Home

Search form

  • Find my LSP
  • Penn
System Status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Backup for Desktop & Laptop
      • Cloud Solutions
      • Data Center Services
      • Database & Middleware Services
      • Endpoint Management
      • Recovery Services
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • Knowledge Link
      • LinkedIn Learning
      • Provider Support Services
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • Penn+Box
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • Network Names & Numbers
      • PennNet
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Broadcasting Studio
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • PennNet Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Services
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
  • Collaborations
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Cloud First
    • Next Generation Unified Communications
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee
        • About PTIC
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • Events
  • About
    • Overview
    • Leadership & Groups
    • Purpose & Values
    • Strategic Goals
    • Recognition
    • Tech Jobs @ Penn
    • Contact Us
  • Hot Topics
  • Get Help
    • Support Center
    • Contact ISC Client Care
    • Rates for All Services

You are here

Home » Information Security Tips for Staff

Information Security Tips for Staff

Welcome to Penn! As a Penn employee, you have access to Penn computing and data. Some of the data you may handle is sensitive information. Penn takes various measures to secure its data, and we depend on you to do the same. Follow these three steps to protect Penn’s confidential information and the University computing assets:

Enroll in Two-Step Verification

Two-Step Verification provides an added layer of protection when accessing PennKey-protected websites and applications. Step 1 is your PennKey and password, and Step 2 is using a mobile application (DUO) or a fob.

  • For more information on Two-Step, visit https://www.isc.upenn.edu/two-step-verification.
  • To enroll in Two-Step, visit: https://twostep.apps.upenn.edu. 
Be Aware of Social Engineering

Social Engineering refers to techniques used by malicious individuals who manipulate users into sharing confidential information. Phishing emails are just one of several social engineering techniques used by hackers and criminals to exploit people’s inclination to trust. Learn more about phishing scams and social engineering at https://almanac.upenn.edu/volume-64-number-6#one-step-ahead-social-engineering.

Understand Penn's Data Risk Classification

It is important that you understand the type of data you handle and how you can protect it. Penn classified its data into three categories, High, Moderate and Low, based on the level of data sensitivity, government regulations, and the University policies. To protect Penn’s data:

  • Use strong passwords for your PennKey and email client.
  • Store data in a secure location, e.g. Box. Contact your Local Support Provider (LSP) for information on where to store sensitive data at your school.  
  • Use Secure Share to exchange sensitive data securely.
  • Adhere to the University Computing Policies and Guidelines.

Share:

  • Facebook
  • Twitter
Print
InfoSec Home
Resources
  • Desktop Security 101
  • Phishing Email Messages Seen at Penn
  • Data Risk Classification
  • Penn+Box 
  • Penn0365 
  • Secure Share
  • LastPass 
  • Policy on Acceptable Use of Electronic Resources
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn
System Status

© 2021 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff