RESOURCES

Read our latest news and access media resources

The Bottom Line

Posted:
Categories: News Coverage

“We are very concerned about cyber security. The potential of identity theft is great and monitary loss can be quite large. We use best practices guidelines, which dictates: who has access; password protocol; encryption of data and emails; backup security; computers timing out; strong network security; top-of-the-line firewall and malware programs. There is also a procedure if anyone suspects a breach in cyber security.” – ProctorU Vice President of Operations Matt Jaeh