Information security coordination services are available to advise you on ensuring the integrity, confidentiality and availability of vital information technology resources and information. Contact us to help you understand how to adhere to campus information security policies. Security compliance serves both the needs of the individual and the university; keeping your personal computer secure protects it from outside intrusions, which in turn, minimizes attacks on the university network.
Some of the security services provided include:
- Risk assessments of information technology projects
- Security assessments of servers and systems handling sensitive information
- Compliance reviews of systems handling Protected Health Information (PHI), VISA/credit card transactions (PCI), FERPA data, financial and personal information on students, staff and faculty
- Instructions on how to Secure Your Workstation
- Assistance with reporting and handling security incidents
- Requests for Security Awareness Training
- Requests for access to other user accounts and data
- Advice on evaluating or selecting information security protection methods
Protect workstations from malware (worms, viruses, backdoors, or Trojan horses) by implementing a firewall. Cybersecurity can help you set up a secure workstation firewall.
A firewall is an intrusion prevention system that unobtrusively blocks improper activity on your workstation. Firewalls analyze workstation traffic – inbound or outbound – and permit only what is considered safe traffic to pass through. Suspicious traffic (improper activity) is blocked, preventing a workstation from being attacked.
McAfee Endpoint Encryption for PC (EEPC) is a security tool which allows your entire system to be protected by an encryption process that makes content contained on your Windows computer inaccessible to anyone without appropriate access or key information. Once your entire system has been encrypted, this process generally operates transparently to allow you to conduct standard activities on your system without disruption from encryption activities.
The system helps prevent potential information security threats and facilitates enhancement of information security standards.
You can request that hard drives be physically destroyed and witnessed by the university's Cyber Security team. This service is particularly aimed at drives that have contained sensitive or confidential information.
Email the Cybersecurity Team: