Skip to main content

A welcome guide for working securely at Yale

Cybersecurity 101

Cybersecurity can be confusing. We want to make working securely at Yale simple and easy to digest.

This page outlines the first things to know to work securely at Yale, no matter your role. We all have a shared responsibility to be good stewards of Yale's data and systems.

Got questions? Email us at information.security@yale.edu.

 

Reporting Bee Logo: Bee Cyber Fit bee holding bullhorn imprinted with the Report an Incident icon

Bee SAFE, Not Sorry and report suspicious cyber activity!

Even if we feel hesitant or embarrassed, it's always better to be safe, not sorry. Report suspicious cyber activity to the ISO, right away!  Reporting can help prevent an event from becoming something bigger that impacts more people.

Visit our Report an Incident page to find out more about reporting, common red flags, and what to do in the event of a lost or stolen device.

 

And check out our Bee SAFE, Not Sorry model to discover the four easy steps to reporting suspicious cyber activity.

 

know your risk icon

Know Your Risk and make your match

At Yale, we classify our data and systems based on risk - high, moderate, or low. As users, we must know the risk classification of the data we use.
 
To ensure we are working securely, we must match the risk of our data with a system that protects that level of risk. This is what it means to "Make Your Match".

There are two paths to making your match:

  • Choose an existing service that matches the classification of your work. Yale maintains a list of commonly used services by risk classification. To view this list, see the webpage Risk Classification of Commonly Used Services at Yale.
  • Build or purchase a new system and ensure it meets the Minimum Security Standards for your risk level. For details on understanding and applying the MSS, view Yale's MSS webpage.

For additional information, review Yale's Data Classification Policy, our Know Your Risk toolkit, or reach out to your local support provider.

 

Icons representing four key cybersecurity behaviors

Four Key Cybersecurity Behaviors to keep you and Yale safe

It only takes simple steps to be cyber fit and Yale's Information Security Office has four easy and repeatable behaviors to help stay cybersafe!

Click with Caution

A cyber attack occurs every 39 seconds. Don't open unfamiliar links or attachments. Trust your gut and outsmart cyber scammers.

Protect Your Identity

It takes only 2 seconds to crack an eleven-character password that uses only numbers. Create strong passwords and use Multifactor Authentication (MFA) to stump the chumps.

Apply Updates

Applying updates is the most important step you can take to keep your data and systems safe. Stay ahead of bad actors by keeping your systems and software up-to-date and enrolling in automated updates.

Know Your Risk

Knowing the risk of your data is the first step to keeping it secure. Classify your data and IT systems based on their risk.

Bee Cyber Fit bees

Build your cyber muscles with our Bee Cyber Fit series

Limited on time? Want quick cyber tips? Or do you want to take a deeper dive into specific security topics?

Whatever the case, our Bee Cyber Fit series has something for everyone!

We simplify cybersecurity with our Bee Cyber Fit monthly tip, newsletter, and podcast. Sign up for alerts, notifications about upcoming events, and chances to win Yale Cybersecurity Awareness prize packs.