An unprotected computer or computerized device that holds data is especially vulnerable to cyber attacks, spam, or other threats. These can compromise a user's identity or undermine the security of the computer's hardware and the information it contains.
Even before you arrive on campus, make sure that your computer will be as safe as possible from viruses and other malicious programs that are rampant on the Internet. Also make sure that you are applying best practices when using computer technology. Tools and resources are available from IS&T, many of them free, to ensure you have a layered defense against many of the threats to your computer and the information it contains.
STOP - Security Tracking of Office Property
Laptops and some other small electronic devices can be tagged with the STOP tag. This loss prevention measure is a visual deterrent to stealing electronic devices. See how it's done. Laptop tagging is FREE. Check out the schedule and get further information.