New Articles

  1. Phishing and Spam at Wharton

    Phishing What are Phishes? Phishing emails are scams sent to you by people or programs who are looking for access to your accounts or to learn valuable information about you. They often appear to be from an administrator of the email system ...
  2. Zoom Meeting Security

    The best way to deal with disruptive behavior in a Zoom meeting is to prevent it from happening in the first place. This article details several ways to secure your Zoom meetings and how you can quickly deal with disruptions in an active Zoom meet...
  3. Google Security & Privacy Checkups

    The Google Security & Privacy checkups provide a quick and effective way to ensure that your Google account is secure and private. These checklists can be used on any Google account, whether it is personal or school-provided. Google Secu...
  4. Web Browser Security

    This article covers the update process for Web Browsers. Faculty and Staff on Wharton-Managed Machines: Your browsers should update automatically but it's still a good idea to follow the steps listed below. Web Browsers Healthy Comput...
  5. Firewalls: What They Are & Why Use Them

    This article will give you an overview of what a firewall is, how it works, and will provide instructions on how to ensure your personal computer's firewall(s) are enabled. Faculty & Staff :  Faculty and Staff using Wharton-imaged or Wharton-p...
  6. Policies, Standards, and Guidelines

    These information security policies, standards, and guidelines provide the minimum requirements for the Wharton community to: Enable the mission of the school. Increase trust and reduce risk. Address regulatory and legal requiremen...
  7. Travel Guidelines

    Work travel can expose you to unique security and privacy risks, which may lead to inconvenient or even damaging incidents if not properly addressed. To mitigate these risks, review Wharton recommendations before your trip to ensure data saf...
  8. AI API Key Requirements

    The Wharton School leverages AI APIs (e.g. ChatGPT Edu and Microsoft Co-Pilot) to enable advanced capabilities while adhering to information security and privacy standards. The following requirements outline the acceptable use and management...
  9. Risk Review Standard

    1. Introduction  This Risk Review Standard  outlines the inputs, activities, decisions, and outputs for submitting and performing risk reviews of enterprise systems and third-party vendors at the Wharton School. Risk reviews are essentia...
  10. Information Security Policy

    1. Introduction  The Wharton School adopts this Information Security Policy to protect the confidentiality, integrity, and availability of digital assets, including information systems that store, process, or transmit data. Wharton shall ...