Tools and Resources
- Vendor VPN Access Form
- Incident Response
- Register a New Server
- Static IP Request
- Border Firewall Exceptions
- SSL Certificates
- Electronic Device Disposal and Transfer
- Wildcard Certificate Requests and Handling Procedures
Encryption converts data into a secure form that can be safely moved around and helps CSU, Chico meet its obligations under various data protection laws and policies. One of the most effective ways to protect personally identifiable or other confidential information stored on a computer is to encrypt it.
Provides helpful tools to assist you with creating and storing passwords.
Personal Certificates allow you to sign and encrypt email and digitally sign documents.
Vulnerability scans provide critical information to the Information Security Office and management as part of the risk assessment process for campus systems.
A Multi-Function Device (MFD) is a device that provides centralized printing, scanning, copying, and faxing functionality; CSU, Chico has a number of these devices in offices around campus.
Cloud computing security, including Software as a Service (SaaS), makes use of the cloud computing infrastructure to deliver one application to many users, regardless of their location. Cloud storage of files can expedite collaboration and sharing of information, however users need to be aware that CSU, Chico explicitly forbids the storage of University Level 1 Protected Information and restricts the storage of Level 2 Private Information.
CSU, Chico provides Information Security Awareness online and on-campus training materials designed to provide staff and faculty with the knowledge they need to secure information resources.
Do's and don'ts to keep your mobile devices and the data stored on them secure against hacking and other security issues.
Frequently Asked Questions and Answers relating to storing data in the cloud shares and sending email and attachments securely.
Campus implementation of the CSU Executive Order 1031. It is intended to ensure compliance with legal and regulatory requirements regarding records retention while implementing appropriate oprational best practices.
The CSU information security policy provides direction for managing third party relationships and contract language.
Any data storage medium - paper, computer, scanner, copier, hard drive, tablet, smartphone - should be treated as if it contained protected data and must be securely wiped prior to transfer or disposal.
Phishing scams are attempts by hackers and cybercriminals to steal personal information or hijack computing resources for nefarious purposes.
You can help to protect yourself against identity theft by reviewing your credit report at least once a year.