Search16 Results

Using Peer to Peer (P2P) software on the Southeast network is against University policy and can result support issues and legal ramifications.
Suggestions, settings, and tips to secure user accounts and data.
The University information security risk analysis process is based on the following steps: Systems inventory, Potential threat identification, Vulnerability identification, Existing security control analysis, Risk likelihood determination,Systems and operations impact analysis and Risk level determination
Tips to avoid Winter Holiday Scams
Tips to safely use public wi-fi hotspots
Tips to ensure good cyber hygiene
Receiving gift cards is great - this short article discusses the best and most secure way to use them.
Southeast provides a documented method to remediate cyber incidents on campus.
To help ensure the security and accountability of university users and related computer systems being accessed, users' access must abide by the following standards.
To maintain a secure infrastructure, campus workstations must meet specific security standards.
Computer and device security are important when traveling stateside or overseas. Take precautions to protect devices prior to, during and returning home.