Information about ISU data security, how to protect your personal and ISU device, security exemption request and consultation.

Articles (22)

Pinned Article Data Security and Management Standards

This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.

Pinned Article Four Steps to Stay Safe Online

Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.

Pinned Article How to Identify and Act On an Email Phishing Attempt

This article describes the steps to take and what to look for in an email to help you identify an email phishing scam and protect your personal information. This article is for students, faculty, and staff.

Pinned Article Security Awareness: General Best Practices for Security

ISU employees must follow security-related best practices. Such practices are common across many different computer environments, and apply on personal computers as well as ISU computers.

Different Types of Regulated Data at ISU

The university is mandated by federal, state and/or local law, or university policy to enforce privacy and security safeguards for regulated data. This area of the Knowledgebase will help guide you through a general overview of regulated data-types at ISU. Please speak to your immediate supervisor for more information related to your role and responsibilities to meet regulatory compliance requirements when generating, storing, using, sharing, and managing regulated data.

Holiday Cybersecurity Tips

This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.

How to Recognize "Current Event" Email Fraud

How to recognize and report email phishing attempts with a "current event"-type subject

How to Recognize a Fake Job Offer

This article describes how to recognize and react to fake job offer scams.

ISUAD Domain Connectivity Standard for ISU-Owned Systems and Devices

This standard describes the benefits and key features of the ISAD domain, how to connect a system to the ISUAD domain, and the requirements for a domain exemption.

Security Awareness: Viruses and Malware

This article provides information on preventing, identifying, and/or responding to a malware attack.

Security Awareness: Student Employment Scams

This article provides examples of student employment-related email scams.

Security Awareness: Phishing

This article provides general awareness information about and instructions for responding to phishing campaigns.

Security Awareness: Ransomware

This article describes ransomware and advises employees on what to do if they think they have been infected by this type of malware.

How to Send a Secure, Encrypted Message from Your University Email Account to a Non ISU Email Account/User.

Office 365 Message Encryption allows ISU email users to send secure protected emails with individuals outside of the University. This can be important to ensure messages securely reach the intended recipient, especially if sensitive data is included.

Screen Locking Standard

The standard screen saver lockout is set to 15 minutes. This security lockout feature should automatically initiate after the computer remains idle from user interaction after the standard, predefined time period. The user must then re-enter their password to gain access to the computer.

How to Set Up Endpoint Encryption Password Self Recovery

This article describes how to set up password self-recovery on encrypted laptops.

McAfee DLP End User Notifications

This article provides general information about McAfee DLP end user notification when a file or message containing a Social Security Number (SSN) is sent in an email or copied to an external USB drive.

Mcafee Endpoint Security for Mac - Security & Privacy Alert

This article will provide a resolution to the issue that occurs when Mcafee Endpoint Security for Mac is unable to properly load or enable some features. Follow the steps in this article to address the McAfee Alert and add McAfee Inc as a trusted developer.

Centrally-Managed Software Updates

This article describes the centralized process for making updates to major enterprise operating systems and applications.

User Account Control Message Requires Administrator Password to Continue

Windows workstations with CyberArk- enabled security will sometimes have a user account control message. This article provides suggestions on how to resolve this issue without entering an administrator password.

Encryption FAQ

This article describes frequently asked question about Endpoint Encryption Software. The target audience students, faculty and staff .