saltar al contenido

Computer Security

Technologies are often subject to threats from a variety of sources, and can jeopardize the work you do, and the content you create and save on your computer. These threats can take the form of external hackers attempting to break into information on your computers and online accounts. Threats can also involve a colleague who might accidentally or intentionally divulge sensitive information.

Since security breaches cannot always be monitored or detected by the IT department, the responsibility of ensuring computer security is jointly shared by the IT department and employees.

Learning objectives:
(1) Describe their role in ensuring and maintaining security.
(2) Identify methods that are commonly used to protect software and data on corporate devices.
(3) Recognize the need for and approaches to ensuring security online.
(4) List best practices necessary to ensure the physical security of commonly-used devices.

Course length: 25 Minutes