Search5 Results

Services or Offerings?
We protect the university's network by using firewalls to block unauthorized access. Changes to firewall rules, additions and custom requests are reviewed to maintain the highest level of security protection on university-wide resources.

Let us identify and evaluate potential threats and vulnerabilities to your technology assets, such as data, applications systems, and infrastructure, to determine the probability and impact of these risks.

Do you have any other needs to train your community, but don’t know where to start? Let us help. We will work with you to design training that meets your expectations and clarifies complex cybersecurity concepts applying official university advice.

Our team facilitates navigation of compliance requirements for regulated data by connecting researchers with appropriate compliance, risk, legal and other ITS teams.

Support process of identifying and fixing the root causes of vulnerabilities and threats within a computer system or network to eliminate them and prevent future exploitation. Service include containing an incident's impact, eradicating the threat, restoring affected systems, and implementing new preventative measures.