Security Awareness and Training (KnowBe4)

KnowB4 logo

KnowBe4 provides security awareness resources to train, promote and reinforce information security best practices.

 

 

About This Service

Key Features

  • Mitigating Cyber Threats: Helps mitigate cyber threats through education on preventing data breaches, phishing attacks, malware infections, and other types of cyber incidents.
  • Customizable Training: KnowBe4 offers a variety of customizable training modules that can be tailored to meet the specific needs of users based on their roles and responsibilities.
  • Phishing simulations: KnowBe4 also offers phishing simulations, which allow Pitt to test users' susceptibility to phishing attacks and provide feedback on areas for improvement.
  • Compliance Support: KnowBe4 offers resources and tools to help Pitt comply with various security and privacy regulations, including HIPAA, PCI DSS, and GDPR.

Getting and Using This Service

How do I access this service?

How do I request this service?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

Who can use this service?

Students, Faculty, Staff

Support

How do I get help?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

 
Request Help

Related Articles (38)

University of Pittsburgh students, faculty, and staff have an international presence. They rely on access to the University’s enterprise IT services, no matter where they may be studying, teaching, or working. However, the unique regulatory and political environment in China can create challenges for members of the University community attempting to access Pitt services.
The University of Pittsburgh relies on a layered approach to security. No single process or technology is sufficient to secure the University’s environment. Instead, we have a robust series of security controls that operate at different layers and perform different tasks. A threat that manages to circumvent one control is likely to be thwarted by a control in another layer.
Every day you receive email messages with attached documents, photos, or other electronic files.
Sometimes these attachments contain destructive viruses, Trojan horses, or spyware, sent intentionally by someone who intends to cause harm or steal sensitive personal information.
Laptops and other portable devices (such as tablets, smartphones, USB drives, CDs, floppy disks, etc.) are frequently stolen or lost. Remember that you should eliminate any unauthorized sensitive information from portable devices and encrypt all authorized sensitive information.
Identity theft has become one of the fastest-growing crimes in America today. Identity theft is the deliberate assumption of another individual's identity, usually to gain access to a person's finances or to frame that person for a crime.
The number of social networking sites is ever growing. Where once our only choice seemed to be Usenet or Friendster (remember those?), we now have a dizzying array from which to choose: Facebook, LinkedIn, Twitter, YouTube, Pinterest, Flickr, Digg, Reddit, Instagram... the list goes on, and changes almost daily!
It is the policy of the University of Pittsburgh to respect the copyright protections given to authors, owners, and publishers under federal law, including the Digital Millennium Copyright Act (“DMCA”). It is against University policy for any student, faculty, or staff member to copy, reproduce, or distribute any software, music, games, or movies, or any other copyrighted work, on University computing equipment except as expressly permitted by a license agreement or with the written consent.
Identifiers That Must Be Removed to Make Health Information De-Identified
This article shows you how to disable your browser's built-in password management feature to avoid confusion and enhance security after you have installed Pitt Password Manager.
Units that are planning to recycle and throw away computer equipment and media are required to do so in a manner that securely removes sensitive information.
This article details how to enable support for TLS 1.2 or 1.3 on web browsers.
This article provides University buyers guidance on how to identify personally identifiable information (PII) when negotiating service agreements or issuing purchase orders for work to be performed by outside vendors.
With more University business being done on mobile devices and smartphones, faculty and staff need to make sure that they are doing their best to secure their devices and protect the University’s interests. Please read over the following guidelines to make sure that your smartphones and tablets are properly secured, regardless of whether they are University-owned or personal.
DMARC is a global industry email and internet security initiative.
Password best practices and standards. Includes FAQ and how-to instructions at the end.