The Protect IU Blog
Posted byon April 12, 2013 at 1:08 PM EDTLearn more about protecting:
Posted byon April 10, 2013 at 4:07 PM EDT
The University Information Security Office (UISO) is pleased to announce that Client Certificates (a.k.a S/MIME certificates) are now available to all IU personnel at no cost. These certificates can be used to encrypt and digitally sign email.
Information on obtaining and using the certificates is available in the Knowledge Base.Learn more about protecting:
Posted byon April 3, 2013 at 2:23 PM EDT
When we consider risks to our personal safety, crossing the street usually doesn’t make the top ten list. Instead, we usually imagine some hulking threat dangerously closing upon us, closely followed by images of our amazing escape from danger! But what if that hulking threat is one of the thousands of motor vehicles travelling in or near our campuses? This risk to our personal safety is real and probably one we don’t often consider. Indiana University has multiple campuses located in dynamic, fast paced environments. Ours is a diverse scholastic world. OLearn more about protecting:
Posted byon March 26, 2013 at 12:26 PM EDT
Question: What do IU Street Smart party animals know about severe weather?
Answer: They know what to do when severe weather visits their neighborhood.Learn more about protecting:
Posted byon March 21, 2013 at 11:26 AM EDT
Celebration of life service: 4:00pm Monday, March 25, 2013, IU Auditorium, Bloomington
Posted byon March 20, 2013 at 11:16 AM EDT
According to both Protiviti and the North Carolina State University’s Poole College of Management, the proper placement of the Chief Risk Officer (CRO) is vital to getting the most out of the position. And, we couldn’t agree more. The CRO is charged with many responsibilities, among them the ability to stimulate discussions and think against the grain. In fact, the ERM Initiative Faculty at NCSU stateLearn more about protecting:
Posted byon March 13, 2013 at 4:00 PM EDT
The University Information Policy Office recently posted and distributed a new policy draft for review, Policy IT-28 Provisioning of Information Technology Services.
Policy IT-28 was drafted and developed with input from key stakeholders, paying particular attention to the Board of Trustees' concerns related to information and information technology risk — which have been continually highlighted by internal audits and repeated security incidents.
IT-28 seeks to reduce the university’s exposure to threats and create economic efficiencies by leveraging common IT infrastructure and services to the greatest extent practicable (thereby freeing up resources for unit-specific needs).
VP for IT and Chief Information Officer Brad Wheeler spoke at a town hall meeting on March 8th on the subject of: “Mitigating Cyber Risks”, which covered the current risk environment, and the development of IT-28.Learn more about protecting:
Posted byon March 8, 2013 at 4:22 PM EST
We are pleased to announce Domain 12: Compliance, of our IU Information Security and Privacy Program.
Since the program is vast, like an encyclopedia, and can be difficult to digest at once, our "12 Domains in 12 Months" campaign encouraged the review of one domain per month -- in hopes to make it easier to study each domain's resources and gauge your local efforts towards meeting the objectives.Learn more about protecting:
Posted byon February 28, 2013 at 4:55 PM EST
March 1 is the first day of "meteorological spring". For IUEMC that means it's Storm Spotter season! With a class at IUPUI on March 19, let's talk about weather some more.Learn more about protecting:
Posted byon February 28, 2013 at 10:40 AM EST
Do you sometimes need to verify that a person is who they say they are, prior to giving them information or access? Have you struggled with ways to do that? Now all the advice we could collect has been put together into one document on Identity Verification.
You'll find a description of different levels of identity verification so you can determine how hard you should work to verify an identity.
Information about these different types of verification is included:Learn more about protecting: