Search13 Results
- Knowledge Base
- Information Security
- Security Consulting and Education
Cybersecurity training is mandatory for all SHU employees, and there are multiple ways to access the required training.
- Knowledge Base
- Information Security
- Security Incident Response and Investigation
Unauthorized access or control has been gained by an external party, jeopardizing the security and privacy of the account owner.
- Knowledge Base
- Information Security
- Security Incident Response and Investigation
If you suspect your account or device might have been compromised, please examine the common signs of a compromise and follow the steps to prevent loss of data.
- Knowledge Base
- Information Security
- Identity and Access Management
Steps to setup multifactor authentication using the Microsoft Authenticator app.
- Knowledge Base
- Infrastructure
- Network and Connectivity Management
A firewall is a critical network security component that helps protect the university or college's network infrastructure, systems, and sensitive data from unauthorized access, cyber threats, and malicious activities.
- Knowledge Base
- Infrastructure
- Monitoring and Alert Management
Splunk is a powerful data analytics and monitoring platform and provides a robust set of tools to analyze and gain insights from diverse data sources.
- Knowledge Base
- Information Security
- Security Policy and Compliance
Essential guidelines and rules established to safeguard digital assets, sensitive data, IT infrastructure and overall information security.
- Knowledge Base
- Information Security
- Security Incident Response and Investigation
Provides end users with the ability to send real-time notifications to the IT Security team when a phishing e-mail is suspected.
- Knowledge Base
- Information Security
- Security Incident Response and Investigation
Windows Defender and McAfee are the two supported antivirus solutions.
- Knowledge Base
- Information Security
- Security Consulting and Education
Training courses that are designed to educate individuals and organizations about information security.
- Knowledge Base
- Information Security
- Secure Computing
Encryption software is used to safeguard sensitive data stored on University issued laptops.
- Knowledge Base
- Information Security
- Identity and Access Management
A security mechanism that requires users to provide two or more forms of authentication to access a system, application or service.
- Knowledge Base
- Information Security
- Security Incident Response and Investigation
Installation instructions for McAfee antivirus software.