• Skip to Content
  • Skip to Main Navigation
  • Skip to Search

Indiana University Indiana University IU

Open Search
  • Data Classification
    • Institutional data
    • Critical Data Guide
      • Storage
      • Sharing
      • Disposal, wiping, & shredding
      • Disclosing with a Third Party
      • Reporting Possible Exposures
    • Restricted Data
    • University-Internal Data
    • Public Data
  • Governance
    • Data Stewards
    • Data Managers
    • Policies
  • How do I...?
    • Record in a Meeting Containing PHI
    • Secure research data
    • Classify research data
    • Select a storage service
    • Request a Third-Party Assessment
    • Share IU data with a third party external to the university
    • Hire consultants that will access IU data
    • Request classification of a new storage platform
    • Purchase a product that will collect or store IU data
    • Add a new application to IU’s inventory
    • Access reports and dashboards
    • Get access to enterprise systems
    • Manage event data at IU
  • Tools & Resources
    • Privacy Notice Generator
    • Storage Management Tool
    • Institutional Data Standards Checklist
    • Data Sharing & Handling
    • Data Classification Matrix
    • Institutional Storage Request Form
    • Data Protection Laws
  • Training
    • Acceptable Use Agreement
    • Data Protection and Privacy Tutorial
    • FERPA Tutorial
    • HRMS Data Use Tutorial
    • HIPAA Training
    • Managing Permissions for Cloud Storage Owners
  • Contact

IU Data Management

  • Home
  • Data Classification
    • Institutional data
    • Critical Data Guide
    • Restricted Data
    • University-Internal Data
    • Public Data
  • Governance
    • Data Stewards
    • Data Managers
    • Policies
  • How do I...?
    • Record in a Meeting Containing PHI
    • Secure research data
    • Classify research data
    • Select a storage service
    • Request a Third-Party Assessment
    • Share IU data with a third party external to the university
    • Hire consultants that will access IU data
    • Request classification of a new storage platform
    • Purchase a product that will collect or store IU data
    • Add a new application to IU’s inventory
    • Access reports and dashboards
    • Get access to enterprise systems
    • Manage event data at IU
  • Tools & Resources
    • Privacy Notice Generator
    • Storage Management Tool
    • Institutional Data Standards Checklist
    • Data Sharing & Handling
    • Data Classification Matrix
    • Institutional Storage Request Form
    • Data Protection Laws
  • Training
    • Acceptable Use Agreement
    • Data Protection and Privacy Tutorial
    • FERPA Tutorial
    • HRMS Data Use Tutorial
    • HIPAA Training
    • Managing Permissions for Cloud Storage Owners
  • Search
  • Contact
  • Home
  • News
  • Cybersecurity Awareness Month 2024

Cybersecurity Awareness Month Wrap-up

Wednesday, October 30, 2024

Catch up on all the spooky, secure and scary safe ways to keep yourself and your data safe. Avoid getting phished, discover the ups and downs of AI, keep your eyes open for deep fakes and more all on the IT news website.

Deep fakes and AI in cyber crime

From the threat of deep fakes to the uncertainty around AI software, developing digital critical thinking skills is crucial to avoid a Machine Uprising. The first step? Know your enemy.

Cybersecurity implications of using data with AI

Data is the fuel of AI, but it also poses significant challenges for security and privacy. As AI systems become more powerful and ubiquitous, they require more data to train and operate, which increases the risks of data breaches, misuse, and abuse.

Tips to secure remote teaching and learning

Working remotely means you’re outside many of the safeguards provided by the IU network. So, to keep your system and data secure, it’s important to know your cybersecurity responsibilities. Discover a few tips and tricks to keep yourself safe at home.

Reporting cybersecurity incidents

IU’s University Information Security Office (UISO) handles incidents involving misuse or abuse of IU information and IT resources, such as security breaches, privacy concerns, lost or stolen devices, and unauthorized disclosure or modification of information.

Learn about phishing

IU delivered 1.3 billion emails and blocked more than 569 million spam emails in 2023. But some spam emails can still get through, ranging from simple messages that can contain malware to ones trying to convince you to give up your credentials to access your information or finances. Learn how to protect yourself from these threats.

Site Navigation

  • Home
  • Data Classification
  • Governance
  • How Do I...?
  • Resources
  • Training

Contact US

University Data
Management Council

  • Email: iudata@iu.edu

Indiana University

Accessibility | College Scorecard | Open to All | Privacy Notice | Copyright © 2025 The Trustees of Indiana University