Identity theft occurs when an unauthorized party uses your personally identifying information (e.g. name, date of birth, address, Social Security Number (SSN), etc.) to assume your identity in order to commit fraud or other criminal acts.
Published Oct 19, 2020
If we practice better password hygiene, we can greatly reduce the chance that cyber events occur.
Published Oct 12, 2020
YOU Are the Best Defense
Published Oct 06, 2020
Cybercriminals know that the best time to turn a phish into a catch is when life gets overwhelming.
Published Oct 05, 2020
October 2020 is the 17th year of organizations promoting National Cybersecurity Awareness Month to help their users be safer and more secure online.
Published Oct 01, 2020
We want to make the University community aware of an increase in email impersonation attacks. These attacks use impersonation of someone that has a working relationship with the recipient.
Published Aug 11, 2020
The Information Security Office is responsible for assisting internal and external auditors in completing control checks against IT systems and data. In the event that there are IT-specific findings once the audit concludes, the ISO is also responsible for communicating and managing the necessary corrective actions.
Published Jun 30, 2020
SendTo.IllinoisState.edu https://SendTo.IllinoisState.edu is a secure file transfer service available to University members. Individuals can send files between each other or with outside parties. It is also useful when the size of the files are too large for sending by email.
Published Jun 10, 2020
Account compromise is one of the top risks to users and organizations. It can cause data exposure, account lockout, and disruption of daily activities. With a few simple changes, you can reduce the chances of it happening to you.
Published Apr 08, 2020
"Zoom bombing" can still occur despite instructors following best practices. This is due to private meeting IDs being shared by students.
Published Apr 03, 2020
One of the strongest protections the University relies upon is the campus network itself. When connected to the wired or wireless network, users benefit from systems that monitor and block various threats.
Published Apr 02, 2020
We are excited to introduce a dedicated location for the Information Security Office to publish and share documentation for the University.
Published Apr 02, 2020