Information Security

Articles about service offerings that provide security, data integrity, and compliance for institutional activities. Includes identity and access management, security consulting and educations, incident response and investigation, and security policy and compliance.

Categories (6)

Endpoint Security

Articles on security software for your computer.

Information Security Training

For articles and training information about cybersecurity.

Guidelines

Articles pertaining to recommended guidelines for security across devices and operating systems.

Data Handling

Articles pertaining to the proper handling of university data.

Articles (1)

Systems and Applications Lifecycle Management Procedure

Security best practices and the campus Minimum Information Security Controls Standard require using supported software to ensure timely security updates. Unsupported software must be upgraded or removed, and it's essential to monitor your applications' and operating system's "end of life" status to plan for necessary upgrades.