Search Google Appliance

An unprotected computer or computerized device that holds data is especially vulnerable to cyber attacks, spam, or other threats that can compromise a user's identity or undermine the security of the computer's hardware and the information it contains.

Even before you arrive on campus, make sure that your computer will be as safe as possible from viruses and other malicious programs that are rampant on the Internet and that you are applying best practices when using computer technology. Tools and resources are available from IS&T, many of them free, to ensure you have a layered defense against many of the threats to your computer and the information it contains.

STOP - Security Tracking of Office Property

Laptops and some other small electronic devices can be tagged with the STOP tag. This loss prevention measure is a visual deterrent to stealing electronic devices. Laptop tagging is FREE. See the schedule and further information.