Introduction to Information Technology Security Office
Virus, worms, hacked, denial of service, and identity theft are the the buzz words in IT Security that everyone has heard. What does this mean to me I have a security program installed? Security of your information and the tools we use is more than just a software package or browser, it is to look both ways before crossing into the information highway. Hackers can get into your machine by a simple click of your mouse or by social engineering. The end goal is to take control of your machine and harvest its data and power. Our campus has approximately 28,000 registered devices that can potentially cause damage to individuals, departments, or the univeristy as a whole. To better equipt our university IT Security Office is a dedicated group to provide audits, awareness training, policy, and to proactively defend the digital landscape.
Click on the links above for a customized security content.
Five hackers are said to be behind breaches totalling up to a staggering three billion credentials from some of the world's biggest tech companies including the Yahoo! breach that led to the loss of 500 million credentials.…
- 1 of 627