Introduction to Information Technology Security Office
Virus, worms, hacked, denial of service, and identity theft are the the buzz words in IT Security that everyone has heard. What does this mean to me I have a security program installed? Security of your information and the tools we use is more than just a software package or browser, it is to look both ways before crossing into the information highway. Hackers can get into your machine by a simple click of your mouse or by social engineering. The end goal is to take control of your machine and harvest its data and power. Our campus has approximately 28,000 registered devices that can potentially cause damage to individuals, departments, or the univeristy as a whole. To better equipt our university IT Security Office is a dedicated group to provide audits, awareness training, policy, and to proactively defend the digital landscape.
Click on the links above for a customized security content.
New Zealand snooped on friendly Pacific island nations' communications to hand the haul to the NSA, according to the latest nugget to pop out of Edward Snowden's PR machine.…
- 1 of 630
Throughout the year, scam artists pose as legitimate entities—such as the Internal...