Skip to main content
Penn Information Systems & Computing Systems Home

Search form

Getting system status
  • Get Started
    • IT Staff
    • Faculty
    • Staff
    • Students
    • Alumni & Guests
    • ISC Staff
  • Services
    • — Services A to Z —
    • Accounts, Access & Security
      • Access Management Services
      • Active Directory
      • Identity Management Services
      • Information Security Services
    • Applications & Data Analytics
      • Application Development & Delivery
      • Data Analytics
        • Data Analytics at Penn
      • Integration Development & Delivery
    • Backup, Storage & Platforms
      • BackItUp
      • Cloud Solutions
      • Data Center & Colocation Solutions
      • Database & Application Platform Support & Consulting
      • Endpoint Management
      • Recovery Solutions
      • Storage
      • Virtual Desktop
      • Virtual Server Hosting
    • Community, Support & Learning
      • Classroom Technology Services
      • Desktop Engineering
      • IT Community Events
      • LinkedIn Learning
      • Tech Center
    • Consulting & Professional Services
      • Brokered Products
      • HireIT
      • Systems Support & Consulting
      • Technology Forecasting
    • Email, Calendaring & Collaboration
      • Classlists
      • Penn Email Routing
      • PennBox
      • PennNet Mailing Lists
      • PennO365
      • PennZoom
      • SMTP-Relay
      • Secure Share
    • Networks & Connectivity
      • Firewall Services
      • Network Design & Installation
      • PennNet
        • Network Names & Numbers
        • MAGPI (Penn's Internet2 Regional Optical Network)
      • PennNet Ethernet Ports
      • Wireless at Penn
    • Phone, TV & Video
      • Contact Center
      • Live Video Streaming
      • Penn Video Network
      • PennFlex Phone
      • Traditional Telephony
      • Video Content Management
      • Video Production
        • Producing Video Content
    • Web Hosting
      • Web Hosting Service
    • — Service Rates —
    • — Service Level Agreements —
  • Security
    • Office of Information Security
    • Security Services
    • Special Projects
    • Policies & Procedures
    • Training & Awareness
    • Penn SecureIT program
  • Collaborations
    • Computing Policies
    • Engaging Penn’s IT Community
    • Identity & Access Management
    • Penn IT Strategic Plan
    • Cloud First
    • Next Generation Unified Communications
    • Penn Bot
    • IT Advisory Groups
      • Common Solutions
      • IT Roundtable
      • Network Policy Committee
      • Penn Technology Investment Committee (PTIC)
        • About PTIC
        • The PTIC IT Development Fund
    • Special Interest Groups (SIGs)
      • Audio-Visual (AV-SIG)
      • Cloud Computing (Cloud-SIG)
      • Data Visualization (DataViz-SIG)
      • Developer SIG (Dev-SIG)
      • High-Performance Computing (HPC-SIG)
      • Instructional Technology SIG
      • Linux SIG
      • Macintosh Networking Group (MacNet)
      • Mobile Technologies (Mobile-SIG)
      • O365 Special Interest Group
      • PC Networking Group (PC-Net)
      • Project Partners SIG
      • Security SIG
      • Social Media SIG
      • Splunk Special Interest Group
      • Super User Group (SUG)
      • Web SIG
    • Technology Services Strategy Review Board
  • News
  • About
  • Hot Topics
  • Get IT Help

You are here

Home » Information Security Tips for Staff

Information Security Tips for Staff

Welcome to Penn! As a Penn employee, you have access to Penn computing and data. Some of the data you may handle is sensitive information. Penn takes various measures to secure its data, and we depend on you to do the same. Follow these three steps to protect Penn’s confidential information and the University computing assets:

Enroll in Two-Step Verification

Two-Step Verification provides an added layer of protection when accessing PennKey-protected websites and applications. Step 1 is your PennKey and password, and Step 2 is using a mobile application (DUO) or a fob.

  • For more information on Two-Step, visit https://www.isc.upenn.edu/two-step-verification.
  • To enroll in Two-Step, visit: https://twostep.apps.upenn.edu. 
Be Aware of Social Engineering

Social Engineering refers to techniques used by malicious individuals who manipulate users into sharing confidential information. Phishing emails are just one of several social engineering techniques used by hackers and criminals to exploit people’s inclination to trust. Learn more about phishing scams and social engineering at https://almanac.upenn.edu/volume-64-number-6#one-step-ahead-social-engineering.

Understand Penn's Data Risk Classification

It is important that you understand the type of data you handle and how you can protect it. Penn classified its data into three categories, High, Moderate and Low, based on the level of data sensitivity, government regulations, and the University policies. To protect Penn’s data:

  • Use strong passwords for your PennKey and email client.
  • Store data in a secure location, e.g. Box. Contact your Local Support Provider (LSP) for information on where to store sensitive data at your school.  
  • Use Secure Share to exchange sensitive data securely.
  • Adhere to the University Computing Policies and Guidelines.

Visit ISC on LinkedIn

Print
InfoSec Home
Resources
  • Desktop Security 101
  • Phishing Email Messages Seen at Penn
  • Data Risk Classification
  • Penn+Box 
  • Penn0365 
  • Secure Share
  • LastPass 
  • Policy on Acceptable Use of Electronic Resources
Contact InfoSec
  • Computing Policies
  • Tech Jobs @ Penn

© 2025 THE UNIVERSITY OF PENNSYLVANIA — 3401 Walnut Street, Philadelphia, PA 19104 — Report accessibility issues and get help — For ISC Staff