Information Security

Secure computing policies, practices and training, device encryption and multi-factor authentication

Services (7)

Device Encryption

Device encryption via Symantec

Information Security Awareness and Training

Departmental and New Hire end user security training

Information Security Incident Handling

Response to Information Security incidents

Malware

Malware (a portmanteau for malicious software) is any software intentionally designed to cause damage to a computer, server, client, or computer network.

Phishing

Report incidents of phishing or other fraudulent e-mail activity

Policy Adherence and Risk Management

Policy Adherence and Risk Management

Two-factor Authentication (2FA)

Duo and Google two-step user support