Cyber security resource hub

The cyber security threat landscape is always evolving, and attacks are becoming more prevalent and sophisticated​.

Explore our collection of educational resources designed to empower you with the knowledge and tools to safeguard yourself and your organization from cyber threats. Join us in building a safer, more secure digital future.


How can we combat cyber attacks?

  1. Defend as one

    Work together as one community and help support each other against the threat of cyber crime​.

  2. Awareness and prevention are better than cure

    Participate in and support organization-wide training and skills that are critical to identifying and mitigating against cyber security threats​. New guidance from the National Cyber Security Centre (NCSC), Universities UK (UUK) and Jisc explains why prevention is better than cure.

  3. Security by design

    Apply security by design concepts in product development to help protect organizations and users. An example of security by design is the OpenAthens Federation where providers of content and services agree to pass verified and encrypted information to library organizations within the trust fabric of the federation.

Image of two laptops and someone using one

Why customers choose OpenAthens as a trusted authentication solution

There are many library authentication solutions available, and this makes it challenging for librarians to know which one to choose. Librarians need to work within the confines of tight budgets and demanding stakeholders. We have summarized a few of the reasons librarians choose us as a trusted solution in our latest blog.

Find out why we are a trusted solution
Misuse - Person downloading lots of content
Single sign-on icon

How OpenAthens helps protect content from misuse

In this Cyber Security Month webinar, Trust and Identity CTO Neil Scully outlines the security risks to organizations and publishers if access is provided with no limits or controls. Neil goes on to explain how our team monitors misuse and the benefits to customers.

Register to watch our webinar on-demand

Useful resources

Man using laptop

Three Ways OpenAthens Delivers Effective Security – While Keeping it Simple for Users

How can OpenAthens deliver effective security, while keeping things unobtrusive for learners and researchers? The simple answer is that we use federated access, which allows users to access resources via single sign-on, within a network of trust. But there are also out-of-the-box features and characteristics of OpenAthens that help deliver security effectively.  

Find out how why we are a secure solution

User privacy and data security

Typing on laptop close up of hands

Back to basics: Security and user privacy

Authentication, authorization, cookies, passwords, security, user privacy… Heard about all these terms but want a better understanding of what they are and how they impact you? Watch our easy-to-follow case study and learn all you need to know about security and user privacy.

Watch the back to basics webinar
silhouette image of a person using a laptop,

Paywalls and Pandemics: Ensuring seamless remote access and data security

Discover how the University of Melbourne increased active users by nearly 50% during the pandemic, whilst maintaining data security. This case study webinar will also explore the challenges faced and discuss important lessons learned.

Watch the case study recording
Iowa State University Library

Security audit inspires Iowa State University Library to implement OpenAthens

When the IT team at Iowa State University Library learned that the library had experienced security issues that resulted in a temporary loss of guest users’ access to some publisher resources, both library and IT teams began looking for a more secure, single sign on authentication solution.

Read Iowa state university library case study

Concerned about cyber security? We can help.

We will use the contact details you provide to us to send you information about our products and services.

You can opt out of our emails at any time by using the link in the emails and you can view our privacy policy.

All required fields are marked with '*'

  • This field is for validation purposes and should be left unchanged.