Phishing, security training, compromised devices, and report lost or stolen technology equipment.

Articles (25)

Pinned Article UTS - Security Standards

An Overview of Oakland University's security standards.

Pinned Article What to Do if Your Account Is Compromised

How to recognize and respond to a compromised Oakland University account.

Cloudflare Troubleshooting

This article outlines troubleshooting steps for users who are blocked by Cloudflare when accessing Oakland University resources.

Computer Virus Prevention Tips

How to protect your desktop and laptop from computer viruses.

Configuring the Duo Mobile App

A guide to configuring the Duo Mobile app.

Duo - First Time Setup & Adding a Device

A guide to adding a device to a Duo account.

Duo Two-Factor Authentication

An explanation of Duo Two-Factor Authentication.

Google Data Loss Prevention (DLP)

This article explains how Oakland University uses Google Data Loss Prevention (DLP) to automatically detect and prevent the sharing of sensitive information.

Incident Response Process

An explanation of the university's incident response process.

Information Technology Security and Compliance Statement

Information Technology Solution Provider Security Statement

Issues Registering for OU Alert Notifications

This article explains how to resolve issues registering for OU emergency alerts by verifying personal information, using correct formatting, and troubleshooting browser settings.

OU Guidelines: Artificial Intelligence Usage

An explanation of Oakland University’s AI Usage Guidelines.

Phish Tank - Explaining Phishing

An explanation of phishing along with a guide on how to protect yourself and what to do if you receive a phishing attempt.

Phish Tank - Fresh Phish

A collection with examples of different phishing attempts.

Procurement, Outsourcing, Cloud, Hosting, Software as a Service, and Application Service Provider Checklist

This checklist guides university staff through security, compliance, and contract considerations when procuring third-party software, cloud services, or hosted applications that handle university data.

Remote Work Security Tips

A guide with suggested security tips for remote work.

Security Baselines

An explanation of the security baselines for various endpoints and servers.

Security Risk Classification

A guide to the security risk classifications.

Systems Security Review Process

An explanation of the systems security review process.

UTS Standard: Data Classification

A brief explanation of UTS standards for data classification.

UTS Standard: Interactive Logon Message

An explanation of the interactive logon message that complies with UTS standards.

UTS Standard: IT Terminology

An explanation of UTS Standard IT Terminology.