Search Google Appliance

An unprotected computer or computerized device that holds data is especially vulnerable to cyber attacks, spam, or other threats. These can compromise a user's identity or undermine the security of the computer's hardware and the information it contains.

Before you arrive on campus, make sure that your computer will be as safe as possible from viruses and other malicious programs that are rampant on the internet. Also make sure that you are applying best practices when using computer technology. Tools and resources are available from IS&T, many of them free, to ensure you have a layered defense against many of the threats to your computer and the information it contains.

STOP - Security Tracking of Office Property

Laptops and other small electronic devices can be tagged with the STOP tag. This loss prevention measure is a visual deterrent to stealing electronic devices. See how it's done. Tag your laptop for FREE at the IS&T Service Desk located in E17.