Search24 Results

Users who require administrative rights on their ISU workstations will install and use Thycotic Privilege Manage to securely elevate their rights. This article describes how to install and use the solution.
Office 365 Message Encryption allows ISU email users to send secure protected emails with individuals outside of the University. This can be important to ensure messages securely reach the intended recipient, especially if sensitive data is included.
This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.
How to recognize and report email phishing attempts with a "current event"-type subject
This article describes how to recognize and react to fake job offer scams.
This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.
The Standard for ISU Email Security for Mobile Devices defines the centrally enforced security device policies required for use of ISU email on personal and ISU-owned mobile devices by ISU faculty, staff, and affiliates. These device policies are required in order for ISU to comply with both the Family Educational Rights and Privacy Act (FERPA) and Indiana Code (IC) 4-1-10.
This article describes frequently asked question about Endpoint Encryption Software. The target audience students, faculty and staff .
This article describes the steps to take and what to look for in an email to help you identify an email phishing scam and protect your personal information. This article is for students, faculty, and staff.
The standard screen saver lockout is set to 15 minutes. This security lockout feature should automatically initiate after the computer remains idle from user interaction after the standard, predefined time period. The user must then re-enter their password to gain access to the computer.
Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.
This article provides general awareness information about and instructions for responding to phishing campaigns.
This article describes ransomware and advises employees on what to do if they think they have been infected by this type of malware.
This article provides information on preventing, identifying, and/or responding to a malware attack.