Introduction to Information Technology Security Office
Virus, worms, hacked, denial of service, and identity theft are the the buzz words in IT Security that everyone has heard. What does this mean to me I have a security program installed? Security of your information and the tools we use is more than just a software package or browser, it is to look both ways before crossing into the information highway. Hackers can get into your machine by a simple click of your mouse or by social engineering. The end goal is to take control of your machine and harvest its data and power. Our campus has approximately 28,000 registered devices that can potentially cause damage to individuals, departments, or the univeristy as a whole. To better equipt our university IT Security Office is a dedicated group to provide audits, awareness training, policy, and to proactively defend the digital landscape.
Click on the links above for a customized security content.
The Scouts Association has taken down its Compass database, which holds the records of nearly half-a-million young people and adult volunteers, after discovering a "potential security vulnerability," The Register can reveal.…
- 1 of 599