Skip to main content
drawing-desktops

Computers at Penn come in all shapes and sizes. Whether you're running a "classic" desktop tower, a laptop, Windows, Mac OS X, or Linux, there are a number of basic security concepts that you should adopt to protect your data, along with every other computing asset on Penn's network. These fundamentals apply regardless of your particular hardware or operating system