- Knowledge Base
- Information Security
        Security best practices and the campus Minimum Information Security Controls Standard require using supported software to ensure timely security updates. Unsupported software must be upgraded or removed, and it's essential to monitor your applications' and operating system's "end of life" status to plan for necessary upgrades.
      
     
  
    
    
    - Knowledge Base
- Information Security
- Guidelines
        This article aims to give users some basic understanding of the security features of OneDrive and how to implement them.  Individuals who handle externally regulated data (Data subject to HIPAA, FERPA, GLBA, or GDPR)  and use OneDrive to store files should read this article.
      
     
  
    
    
    - Knowledge Base
- Information Security
- Information Security Training
        In your personal life, there are four key actions that you can take to reduce the risk of falling victim to a cyber scam. This article covers those four points.