Cybersecurity resource hub

The cybersecurity threat landscape is always evolving, and attacks are becoming more prevalent and sophisticated​.

Explore our collection of educational resources designed to empower you with the knowledge and tools to safeguard yourself and your organization from cyber-threats. Join us in building a safer, more secure digital future.

Protect against cyber-attacks. Gem up on your cybersecurity knowledge. Woman working from home.

How can we combat cyber attacks?

  1. Defend as one

    Work together as one community and help support each other against the threat of cybercrime​.

  2. Awareness and prevention are better than cure

    Participate in and support organization-wide training and skills that are critical to identifying and mitigating against cybersecurity threats​. Guidance from the National Cyber Security Centre (NCSC), Universities UK (UUK) and Jisc explains why prevention is better than cure.

  3. Security by design

    Apply security by design concepts in product development to help protect organizations and users. An example of security by design is the OpenAthens Federation where providers of content and services agree to pass verified and encrypted information to library organizations within the trust fabric of our federation.

Cyber Security Month. Customer support for cybersecurity.
Single sign-on icon

Cybersecurity webinar: Keeping your user data secure

10 October 2024, 15:00 BST/ 10:00 EDT

In this Cyber Security Month webinar, our platform engineer and security and compliance coordinator, Joe Bromley, explains how our product has security controls built into it by design. He will also discuss how we manage security within our team and how we comply with security standards and data protection laws. You’ll have the chance to ask us any questions during the webinar.

Register for our webinar!
Protect against cyber-attacks. People meeting in the office.

Blog: How to protect your organization from cyber-attacks

Education and research organizations are a prime target for cyber-attacks because of the valuable data they hold. We outline some of the key actions librarians and publishers can take now to help protect against cyber-attacks.

Read our Cyber Security Month blog
Cyber Security Month. Woman using laptop in a library
Single sign-on icon

Cybersecurity webinar: Their risk is our risk – conversations with your information security folks

30 October 2024, 15:00 BST/ 10:00 EDT

In this Cyber Security Month webinar,  guest speakers Sari Frances and Brian Kelly will review the recent Scholarly Networks Security Initiative (SNSI) report that highlights cybersecurity risks to scholarly publishing and how to start a conversation with your information security team.

Guest speakers:

  • Sari Frances, director of content protection services, Elsevier
  • Brian Kelly, AVP of virtual CISO, Compass IT Compliance
Register for our webinar!

Blog: Cybersecurity in the pharmaceutical industry

As the pharmaceutical industry becomes increasingly digital and data-driven, safeguarding sensitive information and infrastructure against cyber threats is is becoming ever more essential. Our blog explores some of the issues facing the pharmaceutical and healthcare industry.

Read our blog on security and the pharmaceutical industry
GEANT cybersecurity month 2024 banner

GEANT cybersecurity webinars

GÉANT Cyber Security Month 2024 webinar program focuses on social engineering techniques. The webinars encourage users to think critically and remain vigilant to stay one step ahead of cyber criminals.

 

Register for GEANT cybersecurity webinars

How OpenAthens helps keep your data safe

Misuse - Person downloading lots of content

Blog and webinar: How OpenAthens helps protect content from misuse

In our 2023 cybersecurity webinar, we outline how OpenAthens can help protect content from misuse in a more targeted way – thanks to the benefits of federated access.

Review our blog and webinar recording
Man using laptop

Blog: Three ways OpenAthens delivers effective security

Neil Scully, trust and identity CTO at Jisc discusses how we deliver effective security, while keeping things simple for learners and researchers. 

Read our blog on effective security
Image of two laptops and someone using one

Blog: Why customers choose OpenAthens as a trusted identity provider

There are many library authentication solutions available, and this makes it challenging for librarians to know which one to choose. We summarize a few of the reasons librarians choose us as a trusted solution.

Read Iowa state university library case study

Useful resources

User privacy and data security

Typing on laptop close up of hands

Back to basics: Security and user privacy

Authentication, authorization, cookies, passwords, security, user privacy… Heard about all these terms but want a better understanding of what they are and how they impact you? Watch our easy-to-follow case study and learn all you need to know about security and user privacy.

Watch the back to basics webinar
silhouette image of a person using a laptop,

Paywalls and Pandemics: Ensuring seamless remote access and data security

Discover how the University of Melbourne increased active users by nearly 50% during the pandemic, whilst maintaining data security. This case study webinar will also explore the challenges faced and discuss important lessons learned.

Watch the case study recording
Iowa State University Library

Security audit inspires Iowa State University Library to implement OpenAthens

When the IT team at Iowa State University Library learned that the library had experienced security issues that resulted in a temporary loss of guest users’ access to some publisher resources, both library and IT teams began looking for a more secure, single sign on authentication solution.

Read Iowa state university library case study

Concerned about cyber security? We can help.

We will use the contact details you provide to us to send you information about our products and services.

You can opt out of our emails at any time by using the link in the emails and you can view our privacy policy.

All required fields are marked with '*'

  • How did you hear about OpenAthens?
  • This field is for validation purposes and should be left unchanged.