Skip to Main Content

What is Your Cyber Perimeter and Why You Need to Protect It

The text "Cybersecurity Tip of the Week"

The cyber perimeter includes applications, systems, and devices that have access to your networks. Perimeters are secured in two ways:

Everyone has a role in protecting the cyber perimeter, at work and at home. Identify your cyber perimeter and do your part to protect your devices. Immediately notify your IT Team if you see a suspicious email or other activity.

In addition to your normal incident response protocols, please contact [email protected] with any incidents or suspected incidents of fraud or cyber-attacks or if you need assistance with internal controls.