Phishing, security training, compromised devices, and report lost or stolen technology equipment.

Articles (13)

Cloudflare Troubleshooting

This article outlines troubleshooting steps for users who are blocked by Cloudflare when accessing Oakland University resources.

Google Data Loss Prevention (DLP)

This article explains how Oakland University uses Google Data Loss Prevention (DLP) to automatically detect and prevent the sharing of sensitive information.

Information Technology Security and Compliance Statement

Information Technology Solution Provider Security Statement

Issues Registering for OU Alert Notifications

This article explains how to resolve issues registering for OU emergency alerts by verifying personal information, using correct formatting, and troubleshooting browser settings.

Phish Tank Fresh Phish

A collection with examples of different phishing attempts.

Procurement, Outsourcing, Cloud, Hosting, Software as a Service, and Application Service Provider Checklist

This checklist guides university staff through security, compliance, and contract considerations when procuring third-party software, cloud services, or hosted applications that handle university data.

Remote Work Security Tips

A guide with suggested security tips for remote work.

Secure Cipher Suites

The purpose of this document is to list recommended practices concerning security of data in transit. In particular this document will cover why certain Protocols/Key Exchanges/Authentication schemes/etc are bad practice as well as a recommendation of use. Once a cipher/protocol/etc has fallen into disuse it will typically not be revived. Please Leave references to RFC's or Official sources when stating something as insecure.

Security Baselines

An explanation of the security baselines for various endpoints and servers.

Security Risk Classification

A guide to the security risk classifications.

UTS - Security Standards

An Overview of Oakland University's security standards.

UTS Phish Tank

An explanation of phishing along with a guide on how to protect yourself and what to do if you receive a phishing attempt.

Vulnerability Management

Vulnerability management encompasses the efforts involved to continually identify, analyze, and eliminate vulnerabilities that exist within an organization’s network.