Search the Knowledge Base for Articles and insights on Information Security and the protection of all SVSU technology.

Articles (4)

Document Protection

Encrypt documents containing sensitive information.

Incident Response - At the Endpoint

When an endpoint is suspected of being compromised and direction to proceed has been received from the ITS security manager, these steps should be taken ASAP by ITS personnel.

Reporting Phishing

How to Report a Phishing Email