Phishing, security training, compromised devices, and report lost or stolen technology equipment.
This article outlines troubleshooting steps for users who are blocked by Cloudflare when accessing Oakland University resources.
This article explains how Oakland University uses Google Data Loss Prevention (DLP) to automatically detect and prevent the sharing of sensitive information.
Information Technology Solution Provider Security Statement
This article explains how to resolve issues registering for OU emergency alerts by verifying personal information, using correct formatting, and troubleshooting browser settings.
A collection with examples of different phishing attempts.
This checklist guides university staff through security, compliance, and contract considerations when procuring third-party software, cloud services, or hosted applications that handle university data.
A guide with suggested security tips for remote work.
The purpose of this document is to list recommended practices concerning security of data in transit. In particular this document will cover why certain Protocols/Key Exchanges/Authentication schemes/etc are bad practice as well as a recommendation of use. Once a cipher/protocol/etc has fallen into disuse it will typically not be revived. Please Leave references to RFC's or Official sources when stating something as insecure.
An explanation of the security baselines for various endpoints and servers.
A guide to the security risk classifications.
An Overview of Oakland University's security standards.
An explanation of phishing along with a guide on how to protect yourself and what to do if you receive a phishing attempt.
Vulnerability management encompasses the efforts involved to continually identify, analyze, and eliminate vulnerabilities that exist within an organization’s network.