Articles related to Information Security i.e. phishing, compromised accounts, and tips for keeping your account safe
Suggestions, settings, and tips to secure user accounts and data.
Using Peer to Peer (P2P) software on the Southeast network is against University policy and can result support issues and legal ramifications.
Southeast provides a documented method to remediate cyber incidents on campus.
Computer and device security are important when traveling stateside or overseas. Take precautions to protect devices prior to, during and returning home.
An article discussing password best practices, management and resets.
The University information security risk analysis process is based on the following steps: Systems inventory, Potential threat identification, Vulnerability identification, Existing security control analysis, Risk likelihood determination,Systems and operations impact analysis and Risk level determination
To help ensure the security and accountability of university users and related computer systems being accessed, users' access must abide by the following standards.
To maintain a secure infrastructure, campus workstations must meet specific security standards.