Docs Information Security


Feature Image
Recognizing and Responding to Identity Theft

Identity theft occurs when an unauthorized party uses your personally identifying information (e.g. name, date of birth, address, Social Security Number (SSN), etc.) to assume your identity in order to commit fraud or other criminal acts.

Published Oct 19, 2020 

Feature Image
Make Strong Passwords to Boost Security

If we practice better password hygiene, we can greatly reduce the chance that cyber events occur.

Published Oct 12, 2020 

Feature Image
Can You Spot The Phishing Email?

YOU Are the Best Defense

Published Oct 06, 2020 

Feature Image
How Do I Protect Myself From Cybercriminals During COVID-19?

Cybercriminals know that the best time to turn a phish into a catch is when life gets overwhelming.

Published Oct 05, 2020 

Feature Image
National Cybersecurity Awareness Month 2020

October 2020 is the 17th year of organizations promoting National Cybersecurity Awareness Month to help their users be safer and more secure online.

Published Oct 01, 2020 

Feature Image
Advisory - Email Impersonation Attacks

We want to make the University community aware of an increase in email impersonation attacks. These attacks use impersonation of someone that has a working relationship with the recipient.

Published Aug 11, 2020 

Feature Image
Addressing IT-Specific Audit Findings

The Information Security Office is responsible for assisting internal and external auditors in completing control checks against IT systems and data. In the event that there are IT-specific findings once the audit concludes, the ISO is also responsible for communicating and managing the necessary corrective actions.

Published Jun 30, 2020 

Feature Image
Keeping data secure with SendTo is a secure file transfer service available to University members. Individuals can send files between each other or with outside parties. It is also useful when the size of the files are too large for sending by email.

Published Jun 10, 2020 

Feature Image
Become a Password Pro

Account compromise is one of the top risks to users and organizations. It can cause data exposure, account lockout, and disruption of daily activities. With a few simple changes, you can reduce the chances of it happening to you.

Published Apr 08, 2020 

Feature Image
Advisory - Zoom "Bombers" and "Raiders" Solicit Meeting IDs

"Zoom bombing" can still occur despite instructors following best practices. This is due to private meeting IDs being shared by students.

Published Apr 03, 2020 

Feature Image
Staying Secure While Off Campus

One of the strongest protections the University relies upon is the campus network itself. When connected to the wired or wireless network, users benefit from systems that monitor and block various threats.

Published Apr 02, 2020 

Feature Image
Introducing Information Security Docs

We are excited to introduce a dedicated location for the Information Security Office to publish and share documentation for the University.

Published Apr 02, 2020