Search15 Results
- Services
- Security
Consultation services to help Identify problems, evaluate security issues, assess risks, and implement solutions to address threats to a the university's computer networks and computer systems
- Services
- Security
- Security Consulting
Requests for assistance with our online security awareness training.
- Services
- Security
- Secure Computing
Request assistance checking if a service is open and listening via a network port scan.
- Services
- Security
- Security Incident Response and Investigation
Report a received phishing email.
- Services
- Security
- Security Incident Response and Investigation
Report a known risk or vulnerability that may not be actively being treated or previously-reported/known.
- Services
- Security
- Security Incident Response and Investigation
Report a cybersecurity event of interest or incident.
- Services
- Security
- Security Incident Response and Investigation
Report an account compromise, such as entering your password in a phishing form or oberservation of unexpected activity on an account.
- Services
- Security
- Security Policy & Compliance
Request assistance reviewing and complying with a data use agreement (DUA).
- Services
- Security
- Security Consulting
Requests to have a visitor join your meeting to discuss a cybersecurity topic to improve awareness.
- Services
- Security
- Security Policy & Compliance
Request assistance reviewing the cybersecurity standing of a vendor and their contractural obligations.
- Services
- Security
- Security Consulting
Request for assistance with reviewing policies, procedures or system architecture to ensure adequate security is addressed.
- Services
- Security
- Secure Computing
Register a server in compliance with the University's Server Security policy.
- Services
- Security
- Secure Computing
Request assistance with improving security system using CIS benchmarks.
- Services
- Security
- Secure Computing
Report or request information about a potential threat.
- Services
- Security
- Secure Computing
Request assistance evaluating weaknesses in a system via a vulnerability scan.