Learn How To Keep Your Information Secure

AlertUR

AlertUR is the University's emergency notification system. In the event of an emergency, alerts are sent to the University community by phone call, text message, or email. All students and employees are automatically enrolled with their University email address. You can opt to provide other contact information by logging in to the system with your NetID.

Antivirus Software

CrowdStrike Falcon is the University’s trusted source of endpoint protection (antivirus software) and is automatically installed on all University managed devices. This computer monitoring tool is designed to prevent, detect, and respond to attempts that could compromise computer systems by recognizing patterns in network connections that indicate malicious activity.

Device Encryption

Full disk encryption is available for computers that handle high-risk sensitive data. To protect the data from unauthorized access, all data on your computer’s internal hard drive is converted into unreadable code that cannot be deciphered easily.

Firewall

The University firewall maintains the security and proper functioning of the University network by filtering out unwanted traffic. Departmental firewall service includes design consultation, installation, upgrades, and 24/7 monitoring and support.

IT Equipment Recovery Program

You can securely recycle personal or University-owned consumer electronics free of charge. All devices are tracked by serial number and all hard drives and storage media are physically destroyed or securely wiped using industry-standard software with regular audits as required by R2 guidelines. Please keep all equipment secured until pickup.

Keeper

Keeper is a secure password management tool that employs end-to-end encryption to ensure your logins and files are always secure. Students are able to sign up for their free annual Keeper account (annual registration is required to maintain your free account).

Mobile Device Management

Mobile devices are a valuable tool in a wide variety of applications with convenient features typically found in a personal computer making them susceptible to theft, loss, and unauthorized use. To ensure your device is properly protected, please contact the University IT Help Desk to request MDM for Office 365 be activated on your account.

Remote Access (VPN)

A Virtual Private Network (VPN) is used to access restricted University resources from off campus through a secured Internet connection. Faculty, staff, and students with a current, active relationship with the University can use VPN. University resources that do not require VPN to access remotely include email, SharePoint, and most library resources.

Software and Patch Management

University IT can manage software delivery and updates on computers running Windows or Mac OS X. This includes operating system updates, security patches, and third party software such as web browsers, productivity and multimedia software, and frameworks.

SSL Certificates

The University has an arrangement with InCommon for issuing digital certificates, which are used to confirm that a website is legitimate and that its online transactions are secured. Certificates are provided free of charge for all University websites and web applications, including in test environments.

Two-Factor Authentication (Duo)

The University uses Duo for Two-Factor Authentication to better protect University data, especially when University accounts are used fraudulently to gain remote access to sensitive information. Duo authentication occurs after you log in with your user name and password using a mobile phone, tablet, or landline to verify your identity.

Virtual Desktop

Virtual desktop allows you to connect to software applications or a Windows desktop environment over the Internet, from anywhere and any device.

Vulnerability Management

Security vulnerabilities introduce risk on our network, applications, and other infrastructure. Managing them involves identification through scans, prioritization, and providing stakeholders with guidance on remediation and mitigation. Our team also supports asset tracking, reporting, and other security testing processes like web application assessments.