Cybersecurity Challenges

Provided by Jim Packard, IT, ACIO & ISO | 22 July 2015

Information Technology will be enhancing all information security protocols, standards, and policies.

This includes, but is not limited to:
– Mobile device security
– Personally Identifiable Information (PII) discovery
– Data Loss Prevention (DLP) and data classification
– Two factor authentication (2FA)
– Acceptable use of computers and technology resources
– Academic and administrative use of cloud storage
– Computer/server security standards

For additional details, visit IT Security.