Security

Information about ISU data security, how to protect your personal and ISU device, security exemption request and consultation.

Articles (27)

Pinned Article Major Windows Updates - XXHX

Information regarding Microsoft's semi-annual update schedule.

Pinned Article Security Awareness: Four Steps to Stay Safe Online

Making the most of technology safely and securely can seem overwhelming and confusing. However, regardless of what technology you are using or how you are using it, here are four simple steps that will help you stay secure.

Pinned Article Security Awareness: General Best Practices for Security

ISU employees must follow security-related best practices. Such practices are common across many different computer environments, and apply on personal computers as well as ISU computers.

Pinned Article Security Awareness: How to Identify and Act On an Email Phishing Attempt

This article describes the steps to take and what to look for in an email to help you identify an email phishing scam and protect your personal information. This article is for students, faculty, and staff.

Pinned Article Standard for Data Management and Security

This article will provide the operational requirements for handling data according to Indiana State Universities policy for data security and management as defined in the University Handbook section 932.

Artificial Intelligence Acceptable Use and Data Security

AI is a new tool for generating content that must be used responsibly in terms of data security, its limitations, and the intellectual property of its outputs.

Different Types of Regulated Data at ISU

The university is mandated by federal, state and/or local law, or university policy to enforce privacy and security safeguards for regulated data. This area of the Knowledgebase will help guide you through a general overview of regulated data-types at ISU. Please speak to your immediate supervisor for more information related to your role and responsibilities to meet regulatory compliance requirements when generating, storing, using, sharing, and managing regulated data.

ISU Standard for Computer System Workstation Security

ISU Employees must comply with all University policies while working in either an on-campus or alternative/remote environment, including those that pertain to information and device security.

Microsoft Intune and Workstation Security KB

Microsoft Intune keeps managed devices secure and up to date while securing ISU’S’s data. Data protection includes event monitoring of sensitive ISU data on and securing workstations and devices from attackers and other compromised systems.

Intune supports managed devices that run Android, iOS/iPad, MacOS, and Windows 10/11.

Reporting an Incorrectly Blocked Website (Cisco Umbrella)

Indiana State University subscribes to a cloud based security service that continuously monitors cyber-space for DNS (domain name system), infrastructure, and IP networks used in current and former cyber-attacks. Cisco Umbrella extends data protection to devices and users anywhere, whether they are on campus or in a remote location.

Security Awareness: Holiday Online Safety Tips

This article provides tips to stay safe online during the holidays. The target audience is students, faculty, and staff.

Security Awareness: How to Recognize "Current Event" Email Fraud

How to recognize and report email phishing attempts with a "current event"-type subject

Security Awareness: How to Recognize a Fake Job Offer

This article describes how to recognize and react to fake job offer scams.

Security Awareness: Viruses and Malware

This article provides information on preventing, identifying, and/or responding to a malware attack.

Shortened URL Security

URL shorteners, like bit.ly and goo.gl, are frequently used to make it easier to display and enter a web address. However, these services make it difficult to determine what the actual address of the site is and where your browser will take you before you click on a shortened link. Bad actors persistently use these services to disguise malicious URLs, often for phishing or to initiative a download link for malware or ransomware.

Standard for ISU Email Security for Mobile Devices

The Standard for ISU Email Security for Mobile Devices defines the centrally enforced security device policies required for use of ISU email on personal and ISU-owned mobile devices by ISU faculty, staff, and affiliates. These device policies are required in order for ISU to comply with both the Family Educational Rights and Privacy Act (FERPA) and Indiana Code (IC) 4-1-10.

Standard for ISUAD Domain Connectivity of ISU-Owned Systems and Devices

This standard describes the benefits and key features of the ISAD domain, how to connect a system to the ISUAD domain, and the requirements for a domain exemption.

Security Awareness: Student Employment Scams

This article provides examples of student employment-related email scams.

Security Awareness: Reporting Phishing

This article provides general awareness information about and instructions for responding to phishing campaigns.

Data Security Awareness Training - United Educators

Annual cybersecurity awareness training is an effective way to help our university community identify and prevent the loss of sensitive data and protect campus data resources. Security awareness training gives employees the information they need to identify the greatest cyber security threats faced by universities and colleges, including phishing emails that are designed to trick you into revealing sensitive university or personal data. United Educators training is a requirement.

Security Awareness: Ransomware

This article describes ransomware and advises employees on what to do if they think they have been infected by this type of malware.

Security Awareness: Coronavirus Related Fraud and Scams

Malicious actors are using the Coronavirus event as a basis for sending phishing emails, purporting to offer information or fraudulent grant money.

How to Send a Secure, Encrypted Message from Your University Email Account to a Non ISU Email Account/User.

Office 365 Message Encryption allows ISU email users to send secure protected emails with individuals outside of the University. This can be important to ensure messages securely reach the intended recipient, especially if sensitive data is included.

Standard for Device Screen Lock

The standard screen saver lockout is set to 15 minutes. This security lockout feature should automatically initiate after the computer remains idle from user interaction after the standard, predefined time period. The user must then re-enter their password to gain access to the computer.

Administrative Rights Management - Thycotic Privilege Manager

Users who require administrative rights on their ISU workstations will install and use Thycotic Privilege Manage to securely elevate their rights. This article describes how to install and use the solution.

Computer and Device Encryption FAQ

This article describes frequently asked question about Endpoint Encryption Software. The target audience students, faculty and staff .