- Knowledge Base
- Information Security
Security best practices and the campus Minimum Information Security Controls Standard require using supported software to ensure timely security updates. Unsupported software must be upgraded or removed, and it's essential to monitor your applications' and operating system's "end of life" status to plan for necessary upgrades.
- Knowledge Base
- Information Security
- Information Security Training
In your personal life, there are four key actions that you can take to reduce the risk of falling victim to a cyber scam. This article covers those four points.