Information Security Tools and Resources

At universities like WCU, maintaining strong backend security must be carefully balanced with the need to provide faculty, staff, and students with an open and dynamic technology environment. Such environments require end users to be well educated and actively engaged in cybersecurity.  This means every member of the WCU community plays a vital role in ensuring information security at WCU.

The WCU Information Security team offers a range of resources to help users not only benefit from robust backend protections, but also gain the tools, knowledge and skills they need to take an active role in safeguarding their devices, systems, and data.
 

DUO Logo

DUO Multi-Factor Authentication

DUO Multi-Factor Authentication protects your digital identity from being compromised even if your password is exposed to bad actors.

Learn more about DUO

Proofpoint Logo

Proofpoint - Email Protection

WCU uses Proofpoint, a leading platform for protecting against spam, phishing, malware, and spoofing attacks that come through email.

Learn more about Proofpoint

Cybereason Logo

Cybereason

Cybereason is an Endpoint Detection and Response (EDR) system that detects suspicious activity, uncovering attackers’ behavior patterns and empowering IS&T to detect and stop emerging attacks. As part of a multi-pronged approach to enhance endpoint security monitoring, all university owned laptops and desktops now require an application called Cybereason.

Phishing Sim Icon

Phishing Simulations

Phishing simulations help users learn to recognize, avoid, and report potential threats that can compromise accounts, critical business data and systems. Just one compromised account can put valuable computing resources and sensitive institutional or personal data at risk of exposure. Even accounts with limited or no access to confidential material can be weaponized to attack and compromise additional user’s accounts until one with sufficient privileges is targeted and taken over. Every account matters.

Fish bowl image

PhishBowl

If you receive a suspicious email, you can visit The Phish Bowl to view a list of latest phishing attempts. If the email is posted, then the email has already been reported, and you can simply delete the email.

How to spot and report a Phish or Spam email

InfoSec Live Training Logo

Live Cybersecurity Training

Upon request, the WCU Information Security team can visit your department, either in person or over Zoom, to provide engaging and informative live cybersecurity training. We'll present real examples of cybersecurity threats that have targeted WCU faculty, staff, and students, and show you how to become a cybersecurity hero by identifying and stopping similar threats in their tracks.  

Contact Info Sec to Schedule Live Cybersecurity Training for Your Department