In today’s digitally connected world, cyber threats and “hactivism” have become serious concerns deserving serious attention. Your research institution has invested heavily in physical site security, but how safe are your computers and networks?

Now is the time to educate yourself on these threats, as well as the means to prevent them.  Below are several resources provided by the Federal Bureau of Investigations (FBI) that will give you a general overview of cyber threats and the best types of cyber security practices.

If you or your institution’s IT team feel that your cyber security has been compromised, please contact your local FBI Field Office immediately.


The Insider Threat - An introduction to detecting and deterring an insider spy -

It’s easy to detect someone from the outside seeking to do an institution harm.  But what if that person has infiltrated your institution and is on the inside?  This general overview of detecting and deterring an insider spy will help make your institution safer.


Internet Social Networking Risks -US-FBI

Social networking is everywhere and nearly everyone engages in it.  Take a moment to learn the risks and preventative measures needed to protect not only your institution, but yourself, from con artists, criminals, and hactivists.


Economic Espionage – Protecting America’s Trade Secrets -

Proprietary information or technology.  Every research institution has them.  In this FBI pamphlet, learn more about the laws in place to protect your institution from those who wish to steal your intellectual property.


Higher Education and National Security: The Targeting of Sensitive, Proprietary and Classified Information on Campuses of Higher Education -

This whitepaper developed by FBI’s Counterintelligence Strategic Partnership Unit will educate U.S. colleges and universities on the risks of cyber security breaches from abroad and how best to protect valuable information and data.


Visitors: Risks and Mitigation -

Learn how to better protect sensitive information at your facility from site visitors who may be seeking to compromise your security parameters.