Search within:
Cybersecurity Awareness Month

Cybersecurity Awareness Month

Every year since 2003, October has been recognized as Cybersecurity Awareness Month. This effort was brought to life through a collaboration between the U.S. Department of Homeland Security and the National Cybersecurity Alliance. Cybersecurity Awareness Month features a variety of topics each week to help inform and educate individuals on how to best protect themselves online. This initiative continues to raise awareness about the importance of cybersecurity across our nation. Here at OHIO, we are dedicated to ensuring the University community has all the resources necessary to be safe and more secure online.

This year, we will focus on four key behaviors which allow users to feel empowered to take responsibility for personal data safety online.

Celebrate Cybersecurity Awareness Month!

Each week of October will feature a different topic within cybersecurity.

Storing University data

Here at OHIO, we are dedicated to protecting University information. We strive every day to provide flexible, secure ways to store sensitive data. Check out our available options or schedule a consultation with an Information Security Analyst today for a customized approach.

Storing data by type

99.9%
of account hacks could have been blocked by multi-factor authentication
70%
of people admit to reusing passwords
20%
of Android users are using the latest (and safest) operating system
43%
of adults report sharing their passwords with at least one person
42%
of email users report phishing to their email providers

Celebrating CSAM

In 2021, in celebration of Cybersecurity Awareness Month, the Information Security Team at Ohio University painted the famous "Graffiti Wall" on campus!

A white wall painted with green text saying "Do Your Part! Cybersecurity Awareness Month #CyberSmart" and a Rufus Bobcat with a CSAM shirt.

What is an Information Security incident?

An information security incident is anything that indicates a threat to computer systems or University data. Some examples include "Zoom bombing", email spoofing, a suspected machine compromise, or unauthorized use of University resources. If someone reports a security incident to you, ask if they have been in contact with the Information Security Office and please notify our team.
 

Contact the Information Security Office