Information Security

A mouse-cursor clicks a button labeled "Security"Our small team works hard to help secure the University's computers and network. We work with you to develop the systems and the policies that reduce threats from inside and outside the campus network.

But the truth is this – security requires everyone's cooperation. Keeping the network, the devices connected to the network, and the information that is exchanged on the network safe from hackers, thieves, viruses, worms, Trojans and other Internet predators is everyone's responsibility.

ITS considers the protection of electronic data and computers a high priority. This page is designed to educate the university community about technology policies that support university's information security program; and equip students, faculty and staff with the tools needed to better protect their computers and data.

Security Highlights

Tips for keeping your info secure:

  • Keep your antivirus and anti-spyware programs up-to-date.
  • Do not give out your password to anyone, for any reason, ever. ITS does not need to ask for your password. If you get an email claiming to be from ITS telling you to enter your password into a form to "reactivate your account" or anything like that, it is fraudulent. Again, ITS does not need to ask for your password.
  • Do not visit sites of dubious legality such as movie-download sites, music "sharing" sites, or pornographic sites. Such sites often attempt to put malicious software on the computers of those visiting them.
  • Make sure your passwords are hard to guess. Passwords should be long-- longer than 8 characters-- and should include letters (both upper- and lower-case), numbers, and special characters such as ! or ^ or +. Read more about password strength.
  • Don't use the same password for every site. This limits the damage should one of your passwords become compromised.

Find out more about what you can do to protect your information online at Staysafeonline.org.

Identity Theft Resources

  • Identity Protection FAQs
  • Identity Theft Information