Information Security

Articles (55)

After an Incident

This guide is for the cybersecurity incident response team after incident recovery of an OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

During an Incident Checklist

This guide is for the cybersecurity incident response team who is investigating an OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

How to read an IT Security Assessment Report

Starting July 1, 2024, the OU IT Security Profile Summary, shared when a security assessment has been completed, is changing it’s look and feel.

How to request a Security Consultation

This article provides an overview of the Security Consultation - Security Assessment Request form and provides guidance for filling out the form.

macOS Time Machine

This article provides a summary of why Time Machine and Migration Assistant are no longer allowed on OU devices and recommends alternative methods of transferring files between computers.

NDAA 889 Guideline

The National Defense Authorization Act Section 889 (NDAA 889) prohibits executive agencies from entering into, or extending or renewing, a contract with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system, on or after August 13, 2020, unless an exception applies or a waiver is granted.

Protect Data: Manage Security Settings in SharePoint, Microsoft Teams, and Groups

As an Owner of a Microsoft SharePoint site or Teams space, you play a critical role in protecting institutional data and ensuring compliance with security and governance policies.  This guideline outlines your responsibilities to secure data, manage access, and periodically review permissions.

Report Security Incident Checklist

This guide is for the user or owner of a OU computer which has been involved in a cyber incident (for example, a malware infection or unauthorized access).

System Log Review Guideline

This guideline provides guidance for implementing the minimum processes that should be in place to ensure all access and activity is reviewed by Asset Administrators.