Security Awareness and Training (KnowBe4)

KnowB4 logo

KnowBe4 provides security awareness resources to train, promote and reinforce information security best practices.

 

 

About This Service

Key Features

  • Mitigating Cyber Threats: Helps mitigate cyber threats through education on preventing data breaches, phishing attacks, malware infections, and other types of cyber incidents.
  • Customizable Training: KnowBe4 offers a variety of customizable training modules that can be tailored to meet the specific needs of users based on their roles and responsibilities.
  • Phishing simulations: KnowBe4 also offers phishing simulations, which allow Pitt to test users' susceptibility to phishing attacks and provide feedback on areas for improvement.
  • Compliance Support: KnowBe4 offers resources and tools to help Pitt comply with various security and privacy regulations, including HIPAA, PCI DSS, and GDPR.

Getting and Using This Service

How do I access this service?

How do I request this service?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

Who can use this service?

Students, Faculty, Staff

Support

How do I get help?

Submit a ticket by clicking the Request Help button on the upper right hand corner of this page.

 
Request Help

Related Articles (27)

University of Pittsburgh students, faculty, and staff have an international presence. They rely on access to the University’s enterprise IT services, no matter where they may be studying, teaching, or working. However, the unique regulatory and political environment in China can create challenges for members of the University community attempting to access Pitt services.
Every day you receive email messages with attached documents, photos, or other electronic files.
Sometimes these attachments contain destructive viruses, Trojan horses, or spyware, sent intentionally by someone who intends to cause harm or steal sensitive personal information.
Laptops and other portable devices (such as tablets, smartphones, USB drives, CDs, floppy disks, etc.) are frequently stolen or lost. Remember that you should eliminate any unauthorized sensitive information from portable devices and encrypt all authorized sensitive information.
Identity theft has become one of the fastest-growing crimes in America today. Identity theft is the deliberate assumption of another individual's identity, usually to gain access to a person's finances or to frame that person for a crime.
The number of social networking sites is ever growing. Where once our only choice seemed to be Usenet or Friendster (remember those?), we now have a dizzying array from which to choose: Facebook, LinkedIn, Twitter, YouTube, Pinterest, Flickr, Digg, Reddit, Instagram... the list goes on, and changes almost daily!
Identifiers That Must Be Removed to Make Health Information De-Identified
Units that are planning to recycle and throw away computer equipment and media are required to do so in a manner that securely removes sensitive information.
With more University business being done on mobile devices and smartphones, faculty and staff need to make sure that they are doing their best to secure their devices and protect the University’s interests. Please read over the following guidelines to make sure that your smartphones and tablets are properly secured, regardless of whether they are University-owned or personal.
Password best practices and standards. Includes FAQ and how-to instructions at the end.
Email is an essential part or our everyday communications. It is also one of the most common methods that hackers use to attempt to gain access to sensitive information. More than 90% of data breaches start with a phishing attack. Phishing uses fraudulent email messages designed to impersonate a legitimate person or organization. They attempt to trick the recipient into downloading harmful attachments or divulging sensitive information, including passwords, bank account numbers, and social secur
Sensitive documents and computer files can be vulnerable to a theft or accidental exposure if not kept physically secured.
The Pitt IT Security team develops and offers training and instructional programming with the latest practices and tools to help University departments increase IT security awareness.
Portable devices include laptop computers, tablets, smartphones, personal digital assistants, USB (flash) drives, and CDs. These devices are frequently stolen or lost. Remember that you should eliminate any unauthorized sensitive information from portable devices and encrypt all authorized sensitive information.
We have the resources you need to keep your computing experience at Pitt safe and secure.
Social networking sites like Facebook and Twitter can be a great way to connect with friends. But there are some social networking safety tips you should always keep in mind.

Details

Service ID: 73
Created
Wed 5/24/23 5:57 PM
Modified
Thu 10/26/23 3:05 PM