Search23 Results
- Knowledge Base
- Security
Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.
- Knowledge Base
- Getting Connected
Following these instructions you should be fully connected to the VPN appliance.
- Knowledge Base
- Getting Connected
This is the updated Secure Client Formally Anyconnect Secure Client instructions for connecting to the VPN.
- Knowledge Base
- Business Applications
- Argos
- Knowledge Base
- Security
This article describes frequently asked question about Endpoint Encryption Software. The target audience students, faculty and staff .
- Knowledge Base
- Security
ISU Employees must comply with all University policies while working in either an on-campus or alternative/remote environment, including those that pertain to information and device security.
- Knowledge Base
- Security
This article describes how to recognize and react to fake job offer scams.
- Knowledge Base
- Security
This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.
- Knowledge Base
- Security
Information regarding Microsoft's semi-annual update schedule.
- Knowledge Base
- Security
This article provides general awareness information about and instructions for responding to phishing campaigns.
- Knowledge Base
- Security
This article describes ransomware and advises employees on what to do if they think they have been infected by this type of malware.
- Knowledge Base
- Security
How to recognize and report email phishing attempts with a "current event"-type subject
- Knowledge Base
- Security
This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.
- Knowledge Base
- Security
This article describes the steps to take and what to look for in an email to help you identify an email phishing scam and protect your personal information. This article is for students, faculty, and staff.