Do you know what information you have stored on your computer? What about old files? Do you know what's stored on your shared drive? On the flash drives in your office? In Cybox? Join Steven Netcott as he gives tips for locating old files, cleaning up files and cutting down on the total amount of information your storing.
Join Extension IT Manager, Deb Coates to learn about passwords, password safes and multi-factor authentication. Find out the steps Extension IT is employing to keep you and your information safe, and what you can do on your end.
In this webinar, Deb Coates will update on keeping your computer and data safe, how to keep and maintain strong passwords, and what security changes are coming from the university and others.
Using CyBox and want to know more about what it can do? Thinking about CyBox and want to know more? We'll talk about using CyBox vs Google Docs, editing from CyBox, sharing files and accessing older versions. Recorded March 1, 2017
Phishing is the attempt to acquire sensitive information such as usernames, passwords and credit card details for malicious reasons. Join Extension IT Manager Deb Coates to discover what you can do to prevent Phishing attempts.
Join Mike Mauton to discover how you can use Cybox to store and share information, keeping your computer and information more secure.
Join Extension IT Manager, Deb Coates as she explores what you can do to keep your data safe. Also, hear about the great things Extension IT is doing to help in that endeavor!
One of the storage options currently offered by ISU is CyBox. CyBox lets you store 100G of information and control who sees the information--just you, one or two others, your office. You can edit documents without ever storing them on your computer and you can restrict who else can download and change. You can also send sensitive information through CyBox instead of via attachments. In this session we'll take a look at CyBox storage, setting permissions and Box Edit features.
The university's six-point security plan includes scanning for protected information. In pursuit of that goal, the university is making available a program called Identity Finder. In this session, we'll talk about what Identity Finder is, how it works and how we plan to roll it out to ISUEO staff.
What’s new, what’s coming and what’s changed since the last time we talked about computer security. We’ll talk about password policies, multi-factor authentication, the data classification policy and other ways to keep your information secure.