Security runs through everything we do at Wharton Computing. Whether developing a learning simulation, storing data and servers, running the school’s technological infrastructure, or handling day-to-day computing tasks, security is our top priority.
Wharton Computing uses a range of industry-standard, best-in-class security methods to protect the School. Firewalls, VPN devices, and encryption are all in play, backed by an on-call team of 24/7 tech-support staff.
- Wharton Information Security Office: Security is a community effort, and Wharton’s Information Security Office is ready to work with you on security-related concerns. You can find more information in Wharton’s Information Security Articles.
- Information Security at the University of Pennsylvania: contains a wealth of information, policies, and advisories.
- Phishing Messages Seen at Penn: lists phishing emails that have been seen on campus.
- Two Factor Authentication for Penn WebLogin: adds an additional layer of security to PennKey credentials. In addition to a username and password, those looking to log into Penn resources need to provide a randomly generated code. (Note: turning on two-factor authentication for your PennKey login does not have any impact on your Wharton logins.)
- Antivirus Software: University-licensed security software, which can be installed on student computers as well as the home computers of faculty and staff.