Security Awareness and Training (KnowBe4)

KnowB4 logo

KnowBe4 provides security awareness resources to train, promote and reinforce information security best practices.

 

 

About This Service

Key Features

  • Mitigating Cyber Threats: Helps mitigate cyber threats through education on preventing data breaches, phishing attacks, malware infections, and other types of cyber incidents.
  • Customizable Training: KnowBe4 offers a variety of customizable training modules that can be tailored to meet the specific needs of users based on their roles and responsibilities.
  • Phishing simulations: KnowBe4 also offers phishing simulations, which allow Pitt to test users' susceptibility to phishing attacks and provide feedback on areas for improvement.
  • Compliance Support: KnowBe4 offers resources and tools to help Pitt comply with various security and privacy regulations, including HIPAA, PCI DSS, and GDPR.

Getting and Using This Service

How do I access this service?

How do I request this service?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

Who can use this service?

Students, Faculty, Staff

Support

How do I get help?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

 
Request Help

Related Articles (26)

University of Pittsburgh students, faculty, and staff have an international presence. They rely on access to the University’s enterprise IT services, no matter where they may be studying, teaching, or working. However, the unique regulatory and political environment in China can create challenges for members of the University community attempting to access Pitt services.
Every day you receive email messages with attached documents, photos, or other electronic files.
Sometimes these attachments contain destructive viruses, Trojan horses, or spyware, sent intentionally by someone who intends to cause harm or steal sensitive personal information.
Laptops and other portable devices (such as tablets, smartphones, USB drives, CDs, floppy disks, etc.) are frequently stolen or lost. Remember that you should eliminate any unauthorized sensitive information from portable devices and encrypt all authorized sensitive information.
Identity theft has become one of the fastest-growing crimes in America today. Identity theft is the deliberate assumption of another individual's identity, usually to gain access to a person's finances or to frame that person for a crime.
The number of social networking sites is ever growing. Where once our only choice seemed to be Usenet or Friendster (remember those?), we now have a dizzying array from which to choose: Facebook, LinkedIn, Twitter, YouTube, Pinterest, Flickr, Digg, Reddit, Instagram... the list goes on, and changes almost daily!
Identifiers That Must Be Removed to Make Health Information De-Identified
Units that are planning to recycle and throw away computer equipment and media are required to do so in a manner that securely removes sensitive information.
With more University business being done on mobile devices and smartphones, faculty and staff need to make sure that they are doing their best to secure their devices and protect the University’s interests. Please read over the following guidelines to make sure that your smartphones and tablets are properly secured, regardless of whether they are University-owned or personal.
Password best practices and standards. Includes FAQ and how-to instructions at the end.
Learn how to spot and report phishing emails.
Sensitive documents and computer files can be vulnerable to a theft or accidental exposure if not kept physically secured.
The Pitt IT Security team develops and offers training and instructional programming with the latest practices and tools to help University departments increase IT security awareness.
Portable devices include laptop computers, tablets, smartphones, personal digital assistants, USB (flash) drives, and CDs. These devices are frequently stolen or lost. Remember that you should eliminate any unauthorized sensitive information from portable devices and encrypt all authorized sensitive information.
We have the resources you need to keep your computing experience at Pitt safe and secure.
Social networking sites like Facebook and Twitter can be a great way to connect with friends. But there are some social networking safety tips you should always keep in mind.