Search16 Results
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
Using Peer to Peer (P2P) software on the Southeast network is against University policy and can result support issues and legal ramifications.
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
Suggestions, settings, and tips to secure user accounts and data.
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
The University information security risk analysis process is based on the following steps: Systems inventory, Potential threat identification, Vulnerability identification, Existing security control analysis, Risk likelihood determination,Systems and operations impact analysis and Risk level determination
- Knowledge Base
- General IT
- News
Tips to avoid Winter Holiday Scams
- Knowledge Base
- General IT
- News
Tips to safely use public wi-fi hotspots
- Knowledge Base
- General IT
- News
Tips to ensure good cyber hygiene
- Knowledge Base
- General IT
- News
Receiving gift cards is great - this short article discusses the best and most secure way to use them.
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
- Knowledge Base
- Security & Safe Computing
- IT Security Policies and Administration
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
Southeast provides a documented method to remediate cyber incidents on campus.
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
To help ensure the security and accountability of university users and related computer systems being accessed, users' access must abide by the following standards.
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
To maintain a secure infrastructure, campus workstations must meet specific security standards.
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
- Knowledge Base
- Security & Safe Computing
- Security Best Practices
Computer and device security are important when traveling stateside or overseas. Take precautions to protect devices prior to, during and returning home.