AlertUR is the University's emergency notification system. In the event of an emergency, alerts are sent to the University community by phone call, text message, or email. All students and employees are automatically enrolled with their University email address. You can opt to provide other contact information by logging in to the system with your NetID.
Cylance Smart Antivirus is available at no cost for University-owned Windows and Mac devices. The software should be installed when a new computer is first configured to connect to the network, or your departmental IT staff can assist. For personal computers, click on the Download Antivirus button to learn more.
Business Continuity Management
Focuses on the business process recovery, in the event of a down-time incident. The business recovery plan tool provides departments with the ability to build their plans, upload business process documentation and download those plans during a downtime incident, in order to maintain the highest level of productivity.
Full disk encryption is available for computers that handle high-risk sensitive data. To protect the data from unauthorized access, all data on your computer’s internal hard drive is converted into unreadable code that cannot be deciphered easily.
Enterprise architecture identifies the principles and standards by which an enterprise will organize itself to most effectively achieve its business goals. Architects will consult with individuals and departments to develop a streamlined approach to guide technology, information, business, and solutions standards throughout the University.
The University firewall maintains the security and proper functioning of the University network by filtering out unwanted traffic. Departmental firewall service includes design consultation, installation, upgrades, and 24/7 monitoring and support.
IT Equipment Recovery Program
You can securely recycle personal or University-owned consumer electronics free of charge. Hard drives in recycled equipment will be destroyed at a secure University location, and serial number tracking on hard drives will give you peace of mind. Please keep all equipment secured until pickup.
Mobile Device Management
Mobile devices are a valuable tool in a wide variety of applications with convenient features typically found in a personal computer making them susceptible to theft, loss, and unauthorized use. To ensure your device is properly protected, please contact the University IT Help Desk to request MDM for Office 365 be activated on your account.
Remote Access (VPN)
A Virtual Private Network (VPN) is used to access restricted University resources from off campus through a secured Internet connection. Faculty, staff, and students with a current, active relationship with the University can use VPN. University resources that do not require VPN to access remotely include email, SharePoint, and most library resources.
Faculty and staff sending legally restricted information to external email addresses are required to use SecureMail. University IT recommends also using SecureMail to send legally restricted information to University email addresses.
Software and Patch Management
University IT can manage software delivery and updates on computers running Windows or Mac OS X. This includes operating system updates, security patches, and third party software such as web browsers, productivity and multimedia software, and frameworks.
The University uses Proofpoint to help protect University email addresses from spam, phishing messages, and other malicious email. Proofpoint also protects all mailing lists and distribution lists. You are automatically enrolled in Proofpoint.
The University has an arrangement with InCommon for issuing digital certificates, which are used to confirm that a website is legitimate and that its online transactions are secured. Certificates are provided free of charge for all University websites and web applications, including in test environments.
Two-Factor Authentication (Duo)
The University uses Duo for Two-Factor Authentication to better protect University data, especially when University accounts are used fraudulently to gain remote access to sensitive information. Duo authentication occurs after you log in with your user name and password using a mobile phone, tablet, or landline to verify your identity.
Virtual desktop allows you to connect to software applications or a Windows desktop environment over the Internet, from anywhere and any device.
Vulnerability scanning allows IT administrators to identify weaknesses in the security of their systems from perspectives both internal and external to the University network. Departmental IT staff can assess the security risk of their systems and prioritize vulnerability remediation through an intuitive web interface.