The Protect IU Blog
Posted byon April 10, 2013 at 4:07 PM EDT
The University Information Security Office (UISO) is pleased to announce that Client Certificates (a.k.a S/MIME certificates) are now available to all IU personnel at no cost. These certificates can be used to encrypt and digitally sign email.
Information on obtaining and using the certificates is available in the Knowledge Base.Learn more about protecting:
Posted byon April 3, 2013 at 2:23 PM EDT
When we consider risks to our personal safety, crossing the street usually doesn’t make the top ten list. Instead, we usually imagine some hulking threat dangerously closing upon us, closely followed by images of our amazing escape from danger! But what if that hulking threat is one of the thousands of motor vehicles travelling in or near our campuses? This risk to our personal safety is real and probably one we don’t often consider. Indiana University has multiple campuses located in dynamic, fast paced environments. Ours is a diverse scholastic world. OLearn more about protecting:
Posted byon March 26, 2013 at 12:26 PM EDT
Question: What do IU Street Smart party animals know about severe weather?
Answer: They know what to do when severe weather visits their neighborhood.Learn more about protecting:
Posted byon March 21, 2013 at 11:26 AM EDT
Celebration of life service: 4:00pm Monday, March 25, 2013, IU Auditorium, Bloomington
Posted byon March 20, 2013 at 11:16 AM EDT
According to both Protiviti and the North Carolina State University’s Poole College of Management, the proper placement of the Chief Risk Officer (CRO) is vital to getting the most out of the position. And, we couldn’t agree more. The CRO is charged with many responsibilities, among them the ability to stimulate discussions and think against the grain. In fact, the ERM Initiative Faculty at NCSU stateLearn more about protecting:
Posted byon March 8, 2013 at 4:22 PM EST
We are pleased to announce Domain 12: Compliance, of our IU Information Security and Privacy Program.
Since the program is vast, like an encyclopedia, and can be difficult to digest at once, our "12 Domains in 12 Months" campaign encouraged the review of one domain per month -- in hopes to make it easier to study each domain's resources and gauge your local efforts towards meeting the objectives.Learn more about protecting:
Posted byon February 28, 2013 at 4:55 PM EST
March 1 is the first day of "meteorological spring". For IUEMC that means it's Storm Spotter season! With a class at IUPUI on March 19, let's talk about weather some more.Learn more about protecting:
Posted byon February 28, 2013 at 10:40 AM EST
Do you sometimes need to verify that a person is who they say they are, prior to giving them information or access? Have you struggled with ways to do that? Now all the advice we could collect has been put together into one document on Identity Verification.
You'll find a description of different levels of identity verification so you can determine how hard you should work to verify an identity.
Information about these different types of verification is included:Learn more about protecting:
Posted byon February 21, 2013 at 10:16 AM EST
The Paradigm Shift
One might think that as an IT security professional I would wish to tactfully discourage the use of Cloud computing; however, that is not entirely the case. Cloud computing opens avenues for collaboration on a scale never before realized by those wishing to integrate in thought and data sharing. Cloud computing virtually dissolves limitations defined by enterprise level networks and even geographical spans. As technology connects individuals, potentially on a global scale, our abilities to develop peer relations and interactions are greatly enhanced.Learn more about protecting:
Posted byon February 18, 2013 at 12:01 PM EST
Whole-disk encryption (WDE) provides an added layer of security for the data on your computer. Tools exist which can circumvent this technology under certain conditions. Lately, you may have heard about a tool from Elcomsoft which combines many popular WDE cracking methods in one.
Some attacks you are probably aware of. If an attacker can guess the encryption password through brute force, he can decrypt the disk without any tools. That's why a good passphrase is a critical part of the encryption process.Learn more about protecting: