Search11 Results
- Knowledge Base
- Information Technology
- Information Security
- Secure Computing
- Knowledge Base
- Information Technology
- Information Security
This article describes considerations for creating a strong password for your UMS account.
- Knowledge Base
- Information Technology
- Information Security
This introductory article on phishing provides a description of phishing, examples of spoofed senders, purposes and types of phishing as well as associated risks.
- Knowledge Base
- Information Technology
- Information Security
This article describes the need and use of the University's Standards for Safeguarding Information when University data is accessed by third-parties. This can take the form of a rider, often Rider C, or a stand-alone Safeguarding Data Agreement.
- Knowledge Base
- Information Technology
- Information Security
This Article provides some proactive measures to minimize phishing impact, some ways to react to phishing, and actions to take if you think you were successfully phished.
- Knowledge Base
- Information Technology
- Information Security
This article describes signs of phishing, actions that criminals use to trick victim in thinking phishing message are real and phishing training that is offered with simulating message.
- Knowledge Base
- Information Technology
- IT Professional Services
- Information Technology Review
Request for Information Technology Review - Form Guidance
- Knowledge Base
- Information Technology
- Information Security
- Security Incident Response and Investigation
UMS Official Policy Document for Vulnerability Management
- Knowledge Base
- Information Technology
- Information Security
- Security Incident Response and Investigation
This article outlines the proper response timelines for US:IT staff to identify and remediate vulnerabilities in the IT systems they manage. The timelines are defined in the UMS Vulnerability Management Program
- Knowledge Base
- Information Technology
- Information Security
The Information Security Office acknowledges the value of use of cloud based solutions in courses. This article provided guidance on how to stay within FERPA requirements when using solutions non-university solutions that contain data or require access by students.
- Knowledge Base
- Information Technology
- Communication and Collaboration
- Website Hosting
Guidelines for collecting data in forms on public campus websites. This applies primarily to WordPress, though some information may be helpful for other services.