Skip to main content
For information on Biola University's coronavirus (COVID-19) response and updates, visit

Information Security News and Updates

Contact Us

The information security team is your point of contact for information, training, and resources to help you keep your personal and business data safe. Come here for information, tutorials, and news regarding cybersecurity.

Report an Incident

Have you experienced a security breach or do you suspect a threat? Submit a report here.

Report an Incident

Contact Info


System Status

Status Information

Featured Post

A computer screen shows text from an email header.

Spot Spoofing Like the Pros

August 25, 2020

Phishers use techniques that allow them to send email from another person's email address without logging in to their email account.

This month, we explain how you can use email headers to identify email address spoofing.


A computer screen shows text from an email header.

Spot Spoofing Like the Pros

August 25, 2020

Phishers use techniques that allow them to send email from another person's email address without logging in to their email account.

This month, we explain how you can use email headers to identify email address spoofing.

A man wears a disguise of glasses, false nose, and mustache.

Can You Spot the Imposter?

July 23, 2020

Over the past few months, we have seen attackers continue to target Biola employees with imposter fraud in the form of phishing emails. Most often, these imposters use sender names as a disguise.

This month, we explain the importance of verifying a sender's email address.

A door to a home stands open.

Hackers Don't Break In, They Log In

June 22, 2020

These days, hackers don’t break in, they log in (with your credentials).

This month, we want to encourage you to keep your guard up. Phishing and social engineering attacks continue to be the most common attack vector used by cyber criminals.

A laptop computer displays a Zoom meeting in progress.

Safeguarding Your Zoom Meetings

May 5, 2020

You may have heard Zoom’s name in the news recently, so we’d like to answer some of your security and privacy questions.

An envelope hangs from a fishhook, over a background of coronavirus shapes.

COVID-19 Scams to Watch Out For

April 22, 2020

Attackers are taking advantage of the COVID-19 situation to capitalize on the fear people experience during a crisis.

This month, we explain the most common COVID-19 scams we have seen since March, and ways you can stay safe.

A woman with a dust mask looks at her upheld smartphone as if taking a selfie.

Working Securely from Home

March 24, 2020

While working from home during the COVID-19 situation, it’s important to practice secure remote computing.

This month, we cover special considerations for working remotely, and for using a personally-owned computer for work.

Two people sitting side by side work on laptop computers.

Digital Inheritance: Your Data in Your Absence

February 20, 2020

Every day, as you interact with technology, you are adding to your digital presence at home and at work. When you’re no longer available, you’ll leave all your accounts and files behind as a digital inheritance for others to manage.

This month, we talk about safe ways to prepare your digital inheritance for others.

Two women write on a whiteboard.

Prepare Your Data for Business Continuity

January 15, 2019

Have you ever been in a situation where you needed to access a coworker's business data, but they were out of the office or unavailable? These situations are common and illustrate the need for sound business continuity practices.

You are responsible to make business data available in your absence so that your team’s work can continue.

Where Should I Store Sensitive Data?

December 13, 2019

Sensitive data is any information that we don't make publicly available. But where should we store sensitive information? And how should we share it with our coworkers?

The way we store and share private information is the backbone of information security.

If You Collect It, Protect It

November 12, 2019

As an employee at Biola, if you collect any information about a person as part of your job, it’s your duty to secure that information, and use it responsibly.

This month, we look at data privacy..

Don't Be Manipulated by Social Engineering

October 24, 2019

For our last week of National Cybersecurity Awareness Month, we focus on your security-mindedness — specifically how to protect yourself against social engineering attacks.

A woman with a laptop sits in an airport. "Stay protected while connected. Public Wi-Fi is not secure and can put your device and data at risk."

Secure Your Tech with 7 Easy Tools

October 16, 2019

Own it. Secure it. Protect it. That’s the 2019 theme for National Cybersecurity Awareness Month.

This week, we review some simple but powerful tech tools for securing your devices and personal information.

A woman's hands hold a smartphone, and little hearts float above it.

Own Your Responsibility on Social Media

October 9, 2019

Social media is a great resource, but it doesn’t come without risks for you, your family, your friends, and your employer. When risk is present, we have a responsibility to keep ourselves and our community safe.

This week, we highlight three areas of responsibility when using social media sites.

Cybsersecurity at Biola - One Year Later

October 3, 2019

One year ago, during National Cybersecurity Awareness Month 2018, Biola launched our university’s Information Security Program.

So what have we being doing at Biola to stay secure?

A smartphone displays a thumbprint on the screen for Touch ID.

Is My Smartphone Secure?

September 19, 2019

This month, we explain the many ways you can protect the information on your smartphone.

Don't Pay the Ransom

August 16, 2019

Ransomware is a type of malicious software that encrypts your files so that you can’t open them without a decryption key.

With a few simple habits, you can protect yourself and Biola against ransomware attacks.

A person's hands hold a pencil and use a mouse to control a desktop computer.

Data Security Training at Biola

August 14, 2019

Biola requires all employees to complete mandatory data security training every year. IT assigns the training through the EverFi system.

A red arrows points up into a red cloud, with the words "Data Backup" below.

Don't Forget to Back Up

July 23, 2019

Data is valuable. No one wants to lose the information stored on their computers.

The only way to protect yourself against data loss is through regular backups.

Safeguard Your WiFi Activity with VPN

June 17, 2019

Everyone likes free WiFi. But when you're doing Biola work from off campus, you need to make sure your network connection is protected from cyber attackers trying to steal your sensitive information.

You can use Biola’s VPN (Virtual Private Network) service to solve this problem..

Orange fish hook above the words, "Simulated phishing."

Simulated Phishing at Biola

May 13, 2019

Simulated phishing is when an organization sends fake phishing emails to employees for the sake of training personnel to recognize phishing, and to gather response data.

At Biola, we use a simulated phishing tool called KnowBe4.

A cell phone taking a photo of a trolley.

Protect Your Tech While Traveling

May 8, 2019

It’s the end of another year at Biola, and many of us have travel plans for the summer. So this month, we share tips for protecting your technology and personal information while traveling.

Two women staring at their cell phones.

Keep What's Private, Private

April 15, 2019

We know that cyber attackers can target you using information they find on public websites.

But what about social network sites, where you choose what you reveal about yourself online? Your interests, location, habits, friends, and family. Attackers can use this information for nefarious purposes.

Man looking at a social media profile on a computer screen.

They Know Who You Are

March 15, 2019

Stay on guard.

Nearly every week, we see cyber attackers target specific Biola employees using personal information they find online. Learn how to best defend yourself against these targeted attacks.

A note thumbtacked to a wall that says: "Password: QWERTY."

Share Access, Not Passwords

February 14, 2019

We all know sharing passwords is unsafe. And yet, nearly every week, Biola employees log in to a coworker’s computer or email account. This is a security risk.

This month, we give you solutions for sharing data access without sharing passwords.

Man looking at computer screen with password in frustration.

Build the Unhackable Passphrase

January 15, 2019

Passphrases are more secure than traditional passwords against common hacking techniques, but are easier to create and to remember. Learn how you can create a passphrase that takes over 330 billion years to crack.

Hand holding a smartphone that says "Is that you?" on the screen.

Stop Email Hackers with Google 2-Step

December 10, 2018

Turn on Google 2-Step Verification for your Biola email account right away. 2-Step is your best defense against phishing attacks. It takes about a minute to set up.

A fishing lure. Don't bite!

How to Avoid Getting Phished

November 9, 2018

Last year, nearly 500 Biolans were phished in a single day. You are a target for phishing attacks. Learn how to recognize phishing attacks, to make sure that you don't take the bait.

Social media app icons

3 Easy Ways to Protect your Personal Information

October 15, 2018

In honor of National Cybersecurity Awareness Month, here are 3 easy things you can do right now to protect your personal information and stay safe online.

Flour Fountain at Biola

Equipping Biola Against Cyber Threats

October 1, 2018

Cyber attacks happen every day, and any one of us could be the point of a Biola data breach. In conjunction with National Cybersecurity Awareness Month, Biola's Information Security team is launching a new information security program for the university.

2 Factor Authentication

Protecting Your Account with 2-Factor Authentication

October 1, 2018

Learn how to use 2-factor authentication (2FA) to add an extra layer of security on top of your password. Use 2FA to keep other people out of your account, and set up the best defense against phishing attacks.