Updated Articles

  1. Managing Passwords (and more) at Penn

    If you have a LastPass account from the University, please see our directions on migrating your account to Dashlane . The University provides a premium password management service, Dashlane. Use this article to help you choose and configur...
  2. Zoom Meeting Security

    The best way to deal with disruptive behavior in a Zoom meeting is to prevent it from happening in the first place. This article details several ways to secure your Zoom meetings and how you can quickly deal with disruptions in an active Zoom meetin...
  3. Virus and Threat Protection at Wharton

    The University of Pennsylvania offers threat protection and antivirus software solutions for faculty, staff, and students for both managed and unmanaged computers. How To Protect Yourself Against Viruses Be Aware of Sites & Attachments As compu...
  4. Zoom Meeting Security

    The best way to deal with disruptive behavior in a Zoom meeting is to prevent it from happening in the first place. This article details several ways to secure your Zoom meetings and how you can quickly deal with disruptions in an active Zoom meet...
  5. Google Security & Privacy Checkups

    The Google Security & Privacy checkups provide a quick and effective way to ensure that your Google account is secure and private. These checklists can be used on any Google account, whether it is personal or school-provided. Google Secu...
  6. Web Browser Security

    This article covers the update process for Web Browsers. Faculty and Staff on Wharton-Managed Machines: Your browsers should update automatically but it's still a good idea to follow the steps listed below. Web Browsers Healthy Comput...
  7. Firewalls: What They Are & Why Use Them

    This article will give you an overview of what a firewall is, how it works, and will provide instructions on how to ensure your personal computer's firewall(s) are enabled. Faculty & Staff :  Faculty and Staff using Wharton-imaged or Wharton-p...
  8. Risk Review Standard

    1. Introduction  This Risk Review Standard  outlines the inputs, activities, decisions, and outputs for submitting and performing risk reviews of enterprise systems and third-party vendors at the Wharton School. Risk reviews are essentia...
  9. Create Your Wharton Account

    The steps used to create your Wharton account based on what kind of a student you are.
  10. Graduation Technology To-Do List (PhD)

    Before You Start: This article is for PhD students. Undergraduate, MBA, and WEMBA Wharton students should go to: Graduation Technology To-Do List | Wharton Knowledge Base   Wharton Computing wants your technology tr...