DATA ASSESSMENT & PROTECTION
Cybersecurity Assistance with Understanding Security Risk and Mitigation
Information security coordination services are available to advise you on ensuring the integrity, confidentiality and availability of vital information technology resources and information. Contact us to help you understand how to adhere to campus information security policies. Security compliance serves both the needs of the individual and the university; keeping your personal computer secure protects it from outside intrusions, which in turn, minimizes attacks on the university network.
Some of the security services provided include:
- Risk assessments of information technology projects
- Security assessments of servers and systems handling sensitive information
- Compliance reviews of systems handling Protected Health Information (PHI), VISA/credit card transactions (PCI), FERPA data, financial and personal information on students, staff and faculty
- Instructions on how to Secure Your Workstation
- Assistance with reporting and handling security incidents
- Requests for Security Awareness Training
- Requests for access to other user accounts and data
- Advice on evaluating or selecting information security protection methods
Request a System or Information Assessment
To request security assessments, contact:
[email protected]
Support - IIT Help Center
404-413-4357 (HELP)
[email protected]
Tools
Protect workstations from malware (worms, viruses, backdoors, or Trojan horses) by implementing a firewall. Cybersecurity can help you set up a secure workstation firewall.
A firewall is an intrusion prevention system that unobtrusively blocks improper activity on your workstation. Firewalls analyze workstation traffic – inbound or outbound – and permit only what is considered safe traffic to pass through. Suspicious traffic (improper activity) is blocked, preventing a workstation from being attacked.
Get Started
Questions?: Contact [email protected]
Georgia State faculty or staff can contact the IIT Technology Service Desk to request a firewall modification.
McAfee Endpoint Encryption for PC (EEPC) is a security tool which allows your entire system to be protected by an encryption process that makes content contained on your Windows computer inaccessible to anyone without appropriate access or key information. Once your entire system has been encrypted, this process generally operates transparently to allow you to conduct standard activities on your system without disruption from encryption activities.
The system helps prevent potential information security threats and facilitates enhancement of information security standards.
Get Started
Questions?: Contact [email protected]
Georgia State faculty or staff who process sensitive information should contact the Technology Service Desk to request encryption.
You can request that hard drives be physically destroyed and witnessed by the university's Cyber Security team. This service is particularly aimed at drives that have contained sensitive or confidential information.
Get Started
Questions?: Contact [email protected]
This service can be requested using the form linked to below.
Request that Georgia State's Cybersecurity review your department's data sharing agreements to ensure the safety and security of your data when shared with 3rd parties or others.
Get Started
Questions?: Contact [email protected]
This service can be requested using the form linked to below.
Have a Cybersecurity Question?
Email the Cybersecurity Team: