It is imperative that all Penn employees take appropriate steps to protect Penn’s computing infrastructure, user accounts, and data. The following tip sheet provides the top ten steps you can take to protect your personal information and the university’s technology assets.
Download Link: