Search3 Results

Security best practices and the campus Minimum Information Security Controls Standard require using supported software to ensure timely security updates. Unsupported software must be upgraded or removed, and it's essential to monitor your applications' and operating system's "end of life" status to plan for necessary upgrades.
This article aims to give users some basic understanding of the security features of OneDrive and how to implement them. Individuals who handle externally regulated data (Data subject to HIPAA, FERPA, GLBA, or GDPR) and use OneDrive to store files should read this article.
In your personal life, there are four key actions that you can take to reduce the risk of falling victim to a cyber scam. This article covers those four points.