This guide is for the cybersecurity incident response team after incident recovery of an OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).
This guide is for the cybersecurity incident response team who is investigating an OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).
Starting July 1, 2024, the OU IT Security Profile Summary, shared when a security assessment has been completed, is changing it’s look and feel.
This article provides an overview of the Security Consultation - Security Assessment Request form and provides guidance for filling out the form.
This article provides a summary of why Time Machine and Migration Assistant are no longer allowed on OU devices and recommends alternative methods of transferring files between computers.
As an Owner of a Microsoft SharePoint site or Teams space, you play a critical role in protecting institutional data and ensuring compliance with security and governance policies. This guideline outlines your responsibilities to secure data, manage access, and periodically review permissions.
This guide is for the user or owner of a OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).