The Division of Information Technology will be installing routine security updates to our servers and network infrastructure from 1:00am until 7:00am on Friday, December 1st. Systems that cannot be safely updated through this automated process will be manually updated by IT personnel during staff hours. Users working on documents stored on the “P-Drive” should ensure they save their work and close […]
Category Archives: Information Security
Becoming a Security Champion
An organization’s culture is only as healthy as the people who form it. Like a houseplant, culture needs some care and attention to maintain its strength and continue to grow. Security champions play a key role in that vital process. Let’s explore this concept by answering a few common questions. What is a security champion? […]
How You Can Help Build a Healthy Security Culture
Every member of an organization plays an important role in shaping culture, which includes a commitment to maintaining security and privacy. Here’s how you can help strengthen the security culture you’re a part of: Take Security Personally While most security awareness programs focus on the security of an organization, the lessons you learn can and […]
The True Meaning of Security Awareness
The concept of awareness refers to someone’s perception and knowledge of any given situation. Awareness serves many different purposes and is often applied to multiple use cases. For example, it’s common for various entities to raise public awareness, usually involving personal safety. The goal of public awareness campaigns is to educate large groups of people […]
Becoming an Insider Asset
The challenge of mitigating threats requires a nuanced combination of people and technology. In theory, modern security technologies can help lower the chances of a phishing email finding your inbox, for example. In reality, even the latest and greatest versions of software or hardware are only as effective as the people that use them. That’s […]
Types of Insider Threats
Insider threats generally fit into three categories: Malicious: someone who intentionally harms an organization Negligent: someone whose carelessness harms an organization Accidental: someone whose mistake harms an organization Gaining an understanding of the different types of threats offers an opportunity to learn more about your role in protecting information. The Malicious Insider Malicious insiders are […]
Navigating the Threat Landscape
Information security presents an ongoing challenge for every organization in every industry. Meeting that challenge requires sound strategies and processes to help navigate the sprawling landscape of threats that put data, systems, and people at risk. As you might expect, most security efforts primarily focus on external threats — those that come from outside the […]
Self-Service Password Reset Changes Scheduled For Oct 25
The Division of Information Technology will be migrating our employee Self-Service Password Reset (SSPR) settings to newer, unified security mechanism within Microsoft 365. This change will occur at approximately 9:00am on Wednesday, October 25th. Here’s what you need to know. Why did we make this change? Microsoft is ending support for our existing Microsoft 365 […]
How To Report Suspicious Email Messages to IT
If you receive an email message that appears suspicious, click the Phish Alert button and the email will be deleted from your inbox and forwarded to our IT team for analysis. Sending IT screenshots or forwarding messages causes us to lose important forensic information and limits our ability to rapidly respond to identified threats. If […]
The Future of Data Protection
Accurately predicting the future requires an ability to build complex projection models based on previous trends. Where data protection is concerned, no such models are necessary, as it’s reasonable to assume two things will remain true for many years to come. The future will include aggressive and ongoing personal data collection. It’s hard to imagine […]