Search46 Results
- Knowledge Base
- ITS Knowledge Base Articles
- ITS Policies and Procedures
Reporting a Security Incident
- Knowledge Base
- ITS Knowledge Base Articles
- Information Security
This page includes all SVSU ITS Security policies categorized into sections. Not all policies are viewable to the public, so some links may not work for everyone. If you have a specific question you can reach out to ITS for more information, at x4225.
- Knowledge Base
- ITS Knowledge Base Articles
- Network, Servers & Storage
- Knowledge Base
Your personal information, Your ID, Your password are valuable to criminals. Learn how to identify Phishing
- Knowledge Base
- ITS Knowledge Base Articles
- Hardware, Software & Printing
University security policies require devices to be encrypted, which this article addresses.
- Knowledge Base
- ITS Knowledge Base Articles
- Information Security
When an endpoint is suspected of being compromised and direction to proceed has been received from the ITS security manager, these steps should be taken ASAP by ITS personnel.
- Knowledge Base
- ITS Knowledge Base Articles
- Email & Calendar
For security reasons implemented by Microsoft and SVSU all 3rd Party mail applications including: mobile device mail, and Apple Mail, and Thunderbird are unable to get SVSU Email and are not supported. Below are instructions for removing legacy Email settings from your phone or Mac OS computer. For the best user experience and security, use the instructions below to get Email and Calendar access using the Microsoft Outlook app.
- Knowledge Base
- ITS Knowledge Base Articles
- Email & Calendar
For security reasons, SVSU blocks certain file types from being sent in Outlook. This helps keep viruses from spreading, and keeps users' computers and accounts safe.
- Knowledge Base
- ITS Knowledge Base Articles
- ITS Policies and Procedures
There are certain scenarios where various departments require unique technology and equipment that may be outside the scope of Information Technology Services (ITS) responsibility or ability to support and may not meet security compliance/standards. This document is to outline the policy requirements for those scenarios where compliance cannot be maintained (i.e. research equipment with special/unique devices attached for data acquisition and/or analysis).
- Knowledge Base
- ITS Knowledge Base Articles
- Information Security
Purview Device Data Loss Prevention (DLP) limits copying and pasting sensitive data into a browser and certain desktop apps, as a security measure, to stop sensitive information from being unintentionally shared or exposed online. It works by confirming the intent to copy sensitive data, reminding the user to protect against data leaks or breaches.
- Knowledge Base
- ITS Knowledge Base Articles
At SVSU, we prioritize security. One of the ways we demonstrate this is to make sure our organization and user's data does not fall into the wrong hands. We have turned on automatic email and attachment encryption for messages that contain personally identifiable information as well as financial data.
- Knowledge Base
- ITS Knowledge Base Articles
- ITS Policies and Procedures
On-call Remediation Time Tracking is currently available on all Network and System Admin related Services. If you are involved in an approved on-call remediation record the amount of time you spent on these tickets or tasks (events) after hours.
Information Security Time Tracking is currently available on all Information Security related Services. If you are involved in any Information Security Services you should record the amount of time you spent on these tickets or tasks (events).
We
- Knowledge Base
- ITS Knowledge Base Articles
- Classroom Support & Instructional Training
- Software Support
Microsoft provides an Advanced Threat Protection (ATP) service that delivers SVSU additional safeguards to our existing email security controls. It is composed of two parts Safe Links and Safe Attachments.
Safe Links looks for malicious URLs. Safe Attachments looks for malicious content in email attachments.
- Knowledge Base
Since OneDrive is the primary cloud storage solution provided for SVSU users, installing alternate (third party) clients for data storage is not allowed. Common alternate cloud storage solutions not allowed would include Dropbox, Google Drive, iCloud and others,
- Knowledge Base
- ITS Knowledge Base Articles
- Account Management
This method authenticates your account using verification codes generated on the Oath Token.