Articles related to Information Security i.e. phishing, compromised accounts, and tips for keeping your account safe

Articles (12)

Cybersecurity Checkup

Suggestions, settings, and tips to secure user accounts and data.

File Sharing

Using Peer to Peer (P2P) software on the Southeast network is against University policy and can result support issues and legal ramifications.

IT Cyber Incident Response Standards

Southeast provides a documented method to remediate cyber incidents on campus.

IT Traveling Safety

Computer and device security are important when traveling stateside or overseas. Take precautions to protect devices prior to, during and returning home.

Passwords Best Practices and Requirements

An article discussing password best practices, management and resets.

Risk Management Standards

The University information security risk analysis process is based on the following steps: Systems inventory, Potential threat identification, Vulnerability identification, Existing security control analysis, Risk likelihood determination,Systems and operations impact analysis and Risk level determination

User Access Standards

To help ensure the security and accountability of university users and related computer systems being accessed, users' access must abide by the following standards.

Workstation Security Standards

To maintain a secure infrastructure, campus workstations must meet specific security standards.