Protecting Information While Using Remote Technologies: Tips for Academic Institutions (ITSAP.00.140)

Protecting Information While Using Remote Technologies: Tips for Academic Institutions (ITSAP.00.140)

Insider Threats: Anyone who has access to institutional networks, systems, and information can cause harm, intentionally (e.g. steal data for personal gain) or unintentionally (e.g. unknowingly handle information inappropriately). Phishing: A threat actor calls, texts, emails, or uses social media to trick users into clicking a malicious link, downloading malware, or sharing sensitive information. Malware: […]

read more

How Updates Secure Your Device (ITSAP.10.096)

RISKS OF PATCHING We recommend installing patches and updates to maintain the ongoing, positive functionality and security of systems and devices. However, patches can disrupt business functions in the following ways: A patch can interfere with the functions in other applications or interrupt other programs. A patch may require that you reboot devices, which can […]

read more