Skip to Page Content
section image picture

Security Awareness

SecureUGA Resources

These straight-forward job aids are designed to support SecureUGA training, but you may find them to be good references for computer security challenges you face every day. 

Use the guide for phish spotting and the phishing to develop your ability to avoid phishing email. Tighten down  your mobile security - criminals target mobile devices too - or learn to keep a clean desk and clear screen. 

Publication Title Description
Is it a Phishing Attempt? A guide designed to help you spot phishing emails, this single page is presented table-style.
What to Look for in a Phishing Email This is a basic phishing example, with comments.  Based on an actual attempt, this level of phishing is fairly easy to spot.
More What to Look for in a Phishing Email This phishing example illustrates a more sophisticated phishing attempt, with comments.  Based on an actual attempt, this level of phishing can be more difficult to spot.
Even More What to Look for in a Phishing Email A highly sophisticated phishing attempt, with comments to help you spot the warning signs.  Based on an actual attempt, this level of phishing is among the most difficult to identify.
Mobile Security A guide to mobile device security presented as a set of desirable outcomes and actions you can take.
Keeping Your Mobile Device Secure Basic steps you can take while using your mobile device  to help keep both it and the data it stores secure.
Is it Sensitive or Restricted Data? A table-style quick reference guide that lists the common types of sensitive and restricted data.
Locking Your Windows 7 PC - Method 1 Instructions for using Ctrl+Alt+Delete to lock your computer whenever you step away from your desk. Locking your computer helps prevent unauthorized access to your data.
Locking Your Windows 7 PC - Method 2 Instructions for using the Windows key + L to lock your computer whenever you step away from your desk. Locking your computer helps prevent unauthorized access to your data.
Locking Your Windows 7 PC - Advanced This guide includes instructions for creating a custom shortcut for locking your Windows 7 PC. Recommended only for those with confidence in their computing skills.
Workstation Security Checklist A checklist you can use to help you establish an office exit routine and practice general workstation security.