Information Security
Guidance
Last modified 8/18/2022
Guidance produced and curated for University members on how to use institutional data and technology resources securely. Includes best practices and recommendations.
- Guidance for Conducting Access Reviews for Information Resources
- Guidance for Conducting Identity Verification
- Guidance for Electronic Signature Use
- Guidance for Securely Receiving Highly Sensitive Information
- Guidance for Securely Storing Information in Microsoft 365 SharePoint Online, OneDrive, or Teams
- Guidance for Selecting a Personal Password Manager
- Password Tips
- Primer on Artificial Intelligence for Higher Education
- Recognizing and Responding to an Email Impersonation Attack
- Recognizing and Responding to Identity Theft
- Recognizing and Responding to Malicious Internet Ads
- Recognizing and Responding to MFA Fatigue Attacks