Take the Duke Security Challenge this October
Duke's Security offices invite you to join in activities for Cybersecurity Awareness Month, including:
Duke Security Challenge
See yourself in cyber by participating in the Duke Security Challenge. Log in to see your initial score and steps you can take to qualify for multiple drawings for prizes during October, including two Grand Prizes.
Log in to the Duke Security Challenge
Simulated Phishing Tests
Duke has a simulated phishing program designed to educate our users on recognizing and reporting suspected phishing attacks. The program is anonymous to entity leadership, non-punitive and not meant to be harmful or disruptive to normal business practice. Many entities have already opted in to phish their users on a monthly or quarterly basis and are seeing improvements.
During October 2022, you can also choose to opt in and agree to participate in additional simulated phishing for a chance to win prizes. Participants will receive a phish each workday between October 3-21 and report it using the “Report Phish to Duke” button to receive up to 60 additional points in the Duke Security Challenge. Points add up to prizes!
Beginning in November, participants will receive one phish per month and may opt out at any time.
Throughout October, Duke’s Security Offices and the Office of Information Technology will share daily security tips and resources. Follow @DukeOIT on Twitter for more.
Duke IT staff will present one Learn IT @ Lunch webinar and are available to present on demand for departments, units and groups. Email firstname.lastname@example.org to request a presentation.
Check out the events in October:
- Oct. 20: Virtual Security Academy session, "A Day in the Life of Security Awareness and Training,” 3:00-4:30 p.m., For meeting details, visit the Get Involved page or join the Duke "Security Ambassadors" Teams Site.
- Oct. 26: Research Wednesday, 1:00-2:00 p.m., https://medschool.duke.edu/research/research-support/research-support-offices/duke-office-clinical-research-docr/docr-0.