Request a live demo for Students,
Institutions, or Professionals

Request a Demo

The Bottom Line

Published: September 28, 2012 | Category: Media

“We are very concerned about cyber security. The potential of identity theft is great and monitary loss can be quite large. We use best practices guidelines, which dictates: who has access; password protocol; encryption of data and emails; backup security; computers timing out; strong network security; top-of-the-line firewall and malware programs. There is also a procedure if anyone suspects a breach in cyber security.” – ProctorU Vice President of Operations Matt Jaeh