Information Security
Guidance
Last modified 8/18/2022
Guidance produced and curated for University members on how to use institutional data and technology resources securely. Includes best practices and recommendations.
- Guidance for Conducting Access Reviews for Information Resources
- Guidance for Electronic Signature Use
- Guidance for Securely Receiving Highly Sensitive Information
- Guidance for Securely Storing Information in SharePoint Online or OneDrive
- Password Tips
- Recognizing and Responding to an Email Impersonation Attack
- Recognizing and Responding to Identity Theft
- Recognizing and Responding to MFA Fatigue Attacks