Feature 1

Feature 1

Laptop and mobile devices on desk

Tips & Stay Informed

Custom text

OIS offers services to help secure information
Person at desk looking at computer monitor

Alert Info Box

fishing hook

 Use caution opening links in email messages

Cybercriminals try to access people's computers by emailing malicious links. They try to rush or trick you into opening these links by making the email appear to come from someone or something your know or trust. Clicking the link may take you to a site that attempts to harvest your information or compromise your computer. Only click on links that you were expecting. 

Securing your Wi-Fi router

The first step to creating a cybersecure home is to start by securing your Wi-Fi router. Be sure to change the default administrator password to something only you know. Wi-Fi routers are shipped with default administrator passwords and may be publicly known and posted on the Internet.

News

New channel

Smart Home Security
Smart Home Devices Need Smart Security
Read more

Telehealth Security
Your Connected Healthcare
Read more

Email Security
Emailing Sensitive University Information
Read more

Ransomware
What is Ransomware?
Read more

 

Custom text

Top 5 Policies and Standards to Know

IT Security Program
Serves as the core for the university's information security activities and provides general guidance


Data Classification
Classifying or labeling university information helps determine minimum security requirements necessary to keep it safe


Data Governance
Ensures university data is managed as a material asset (also see Data Management Group Process)


Systemwide Security Baseline Standards
Provides guidelines for selecting and specifying security controls for organizations and information systems


Systemwide High Impact Security Standards
Security standards and requirements for protecting highly confidential information when processed, stored, or transmitted.