Search74 Results
- Knowledge Base
- Security
ISU employees must follow security-related best practices. Such practices are common across many different computer environments, and apply on personal computers as well as ISU computers.
- Knowledge Base
- Business Applications
- Banner
Current list of departmental security managers for Banner.
- Knowledge Base
- Security
ISU Employees must comply with all University policies while working in either an on-campus or alternative/remote environment, including those that pertain to information and device security.
- Knowledge Base
- Security
AI is a new tool for generating content that must be used responsibly in terms of data security, its limitations, and the intellectual property of its outputs.
- Knowledge Base
- Security
This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.
- Knowledge Base
- Security
Annual cybersecurity awareness training is an effective way to help our university community identify and prevent the loss of sensitive data and protect campus data resources. Security awareness training gives employees the information they need to identify the greatest cyber security threats faced by universities and colleges, including phishing emails that are designed to trick you into revealing sensitive university or personal data. United Educators training is a requirement.
- Knowledge Base
- Security
The Standard for ISU Email Security for Mobile Devices defines the centrally enforced security device policies required for use of ISU email on personal and ISU-owned mobile devices by ISU faculty, staff, and affiliates. These device policies are required in order for ISU to comply with both the Family Educational Rights and Privacy Act (FERPA) and Indiana Code (IC) 4-1-10.
- Knowledge Base
- Security
Microsoft Intune keeps managed devices secure and up to date while securing ISU’S’s data. Data protection includes event monitoring of sensitive ISU data on and securing workstations and devices from attackers and other compromised systems.
Intune supports managed devices that run Android, iOS/iPad, MacOS, and Windows 10/11.
- Knowledge Base
- Security
This article provides information on preventing, identifying, and/or responding to a malware attack.
- Knowledge Base
- Security
This article provides general awareness information about and instructions for responding to phishing campaigns.
- Knowledge Base
- Security
This article describes ransomware and advises employees on what to do if they think they have been infected by this type of malware.
- Knowledge Base
- Security
This article describes the steps to take and what to look for in an email to help you identify an email phishing scam and protect your personal information. This article is for students, faculty, and staff.
- Knowledge Base
- Security
This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.
- Knowledge Base
- Security
This article describes how to recognize and react to fake job offer scams.
- Knowledge Base
- Business Applications
- Argos