Information Security Consulting Request

Service Description

The Information Security Office provides information security consulting and services for the following types of requests (and others):

Type of Request Type of Request
Compromised account investigation Compromised System Investigation
DNS Blocking Reachability Assessment
Log Analysis Update Authorized Quarantine Users
Traffic Analysis Vulnerability Assessment
Data Exposure Zoombombing
Malware Other (please describe)
Storing HIPAA data --

How to Create a Ticket

To request security consultation Create a Ticket (top right of the page) and provide a detailed description of your request.

Available To

All UO Staff, Faculty, and Students.

Questions

If you have any additional questions contact infosec@uoregon.edu

[back to top]

 
Create a Ticket

Related Articles (24)

Amendments to State of Oregon Policies on Acceptable Use of State Electronic Information Systems (Version 3: August 1, 1997).
Generally, most technology tools and services are available globally. There are, however, some nations that block traffic to and from specific services, and the United States maintains sanctions against certain countries that prohibit network communications.
Recommendations to secure an Android device.
The information in this article will help you to secure your Chromebook by implementing settings that will help to safeguard your privacy and make your device more secure.
This article is a quick reference for how to handle, transmit and dispose of sensitive data.
What is doxing, how do we avoid it, and respond if it should happen.
This article is an introduction of Europe's General Data Protection Regulation for individuals in the states interested in compliance laws and data rights. Additional links are available for students or staff curious about the University of Oregon's data classifications and standards.
This article provides a high-level overview of securing home networks with links to specific articles.
Security recommendations for iOS devices including iPads, iPhones, and iPods.
This article provides guidance on securing personal IoT devices
This article provides an overview of how to secure a personal mobile device.
Security best practices and guidelines for personally owned computers running the Windows operating system.
Information of how to protect your information from hackers and identity thieves.