- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
- HOME
- About Research IT
- Campus Resources
- Endpoint Support & Network Services
- Application Infrastructure & Technical Solutions
- Research Computing & Cyberinfrastructure
- Research Data Security
- Reporting Data & Analytics
- Strategic & Tactical Planning
- Business Analysis & Project Management
- Work Coordination & Facilitation
Protecting from Insider Threats
Don’t let yourself be the threat!
Double check senders and protections when sending protected data
Be aware of the data security requirements for the data you are handling and follow them
Avoiding Insider Threats, proverbs to stay secure:
“Trust but Verify”
“Need to know” / Minimum Necessary Access
“Locks keep people honest”