CSU, Information Security Officer provides security aawareness training on-campus also training materials designed to provide staff and faculty with the knowledge they need to secure information resources. Email firstname.lastname@example.org for information security training for your department.
Any device connected to an CSU network must meet the following security requirements:
When practical, servers should be set up in a hardened (secure) systems configuration:
ITS utilizes multiple online backup vaults to store data. The data vaults are geographically spread out to ensure the survival of CSU's critical information. Each backup vault is a self contained unit. It requires no additional hardware or software to access its contents. ITS encourages end users to copy critical and sensitive data to shared drives for backing up.
A system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in hardware, software, or a combination of both.
Encryption converts data into a secure form that can be safely moved around and helps CSU, Clayton meet its obligations under various data protection laws and policies. One of the most effective ways to protect personally identifiable or other confidential information stored on a computer is to encrypt it.
Vulnerability scans provide critical information to the Information Security Office and management as part of the risk assessment process for campus systems.
Any data storage medium - paper, computer, scanner, copier, hard drive, tablet, smartphone - should be treated as if it contained protected data and must be securely wiped prior to transfer or disposal.