Do you know what information you have stored on your computer? What about old files? Do you know what's stored on your shared drive? On the flash drives in your office? In Cybox? Join Steven Netcott as he gives tips for locating old files, cleaning up files and cutting down on the total amount of information your storing.
Join Extension IT Manager, Deb Coates to learn about passwords, password safes and multi-factor authentication. Find out the steps Extension IT is employing to keep you and your information safe, and what you can do on your end.
Phishing is the attempt to acquire sensitive information such as usernames, passwords and credit card details for malicious reasons. Join Extension IT Manager Deb Coates to discover what you can do to prevent Phishing attempts.
Join Mike Mauton to discover how you can use Cybox to store and share information, keeping your computer and information more secure.
Join Extension IT Manager, Deb Coates as she explores what you can do to keep your data safe. Also, hear about the great things Extension IT is doing to help in that endeavor!
The university's six-point security plan includes scanning for protected information. In pursuit of that goal, the university is making available a program called Identity Finder. In this session, we'll talk about what Identity Finder is, how it works and how we plan to roll it out to ISUEO staff.