Tools and Services Quick Links
(Click the icons to be redirected)
Protect Your Privates is a cyber security outreach campaign by the Information Security Office. The sole purpose is to educate students, faculty, and staff on the many ways they can protect their personal information online and offline.
Click the logo button above or click one of the following buttons to learn more about protecting your data.
We recommend you begin with the top 10 list.
ABOUT THE INFORMATION SECURITY OFFICE
At the Information Security Office, we encourage faculty, staff, and students to #ProtectYourPrivates from cyber criminals, thieves, and everyone else.
The mission of the Information Security Office (ISO), as required by state law, is to assure the security of the university's Information Technology (IT) resources and the existence of a safe computing environment in which the university community can teach, learn, and conduct research.
The ISO collaborates with campus IT leaders and university audit, compliance, and legal units to support the university's teaching, research, and public service missions.
Policy and Standards
The ISO assists technology managers with security administration, implementation, and management. This includes testing and evaluating security technologies, advising on security related technology projects, and aiding management of security technology, with special emphasis on mission critical IT resources.
Monitoring and Testing
The ISO conducts institutional security testing and monitoring in support of policy enforcement and operational assurance. The ISO monitors computer and network resources for suspicious activity and test information resources for security vulnerabilities. This includes performing network intrusion detection, conducting security scanning of university computers, testing IT Web-enabled services, and conducting intelligence analysis to identify security threats. The ISO assures all departmental security monitoring and testing activities are compliant.
The ISO maintains a campus-wide information security risk management program to evaluate threats and vulnerabilities and assure creation of appropriate remediation plans. This supports for assessing security risk, creating and monitoring security plans, and aiding disaster recovery planning.