Search16 Results
- Knowledge Base
- Security
Digital safety is a shared responsibility. By remaining vigilant, adopting best practices, and staying informed, staff, faculty, and students can substantially reduce cyber risks and contribute to a safer, more secure higher education environment. Remember—cybersecurity is not only about technology; it’s about people, awareness, and proactive action.
- Knowledge Base
- Security
This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.
- Knowledge Base
- Security
As higher education institutions increasingly rely on digital technology for teaching, research, and administration, the importance of cybersecurity cannot be overstated. Cyber threats such as phishing attacks, data breaches, ransomware, and social engineering have become common, targeting universities, colleges, and those who work and study within them. Staff, faculty, and students are collectively responsible for safeguarding personal and institutional data. This knowledge base article outline
- Knowledge Base
- Security
This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.
- Knowledge Base
- Business Applications
- Argos
- Knowledge Base
- Security
This article describes frequently asked question about Endpoint Encryption Software. The target audience students, faculty and staff .
- Knowledge Base
- Email, Calendaring, File Storage and Additional Productivity Tools
This article will assist anyone required to set up Office 365 Multi-Factor Authentication to access Office 365 resources. This article is for faculty, staff and student employees required to use Office 365 Multi-Factor Authentication.
- Knowledge Base
- Security
The Standard for ISU Email Security for Mobile Devices defines the centrally enforced security device policies required for use of ISU email on personal and ISU-owned mobile devices by ISU faculty, staff, and affiliates. These device policies are required in order for ISU to comply with both the Family Educational Rights and Privacy Act (FERPA) and Indiana Code (IC) 4-1-10.
- Knowledge Base
- Get Connected
Following these instructions you should be fully connected to the VPN appliance.
- Knowledge Base
- Security
The standard screen saver lockout is set to 15 minutes. This security lockout feature should automatically initiate after the computer remains idle from user interaction after the standard, predefined time period. The user must then re-enter their password to gain access to the computer.
- Knowledge Base
- Security
This article describes ransomware and advises employees on what to do if they think they have been infected by this type of malware.
- Knowledge Base
- Security
This article provides information on preventing, identifying, and/or responding to a malware attack.
- Knowledge Base
- Security
Office 365 Message Encryption allows ISU email users to send secure protected emails with individuals outside of the University. This can be important to ensure messages securely reach the intended recipient, especially if sensitive data is included.
- Knowledge Base
- Get Connected
This is the updated Secure Client Formally Anyconnect Secure Client instructions for connecting to the VPN.
- Knowledge Base
- Security
ISU Employees must comply with all University policies while working in either an on-campus or alternative/remote environment, including those that pertain to information and device security.