Frequently Asked Questions - Security :: Breaches

Printer-friendly version

A number of tools are available that are useful at various stages of an investigattion:

Click the link to find out more about any of these tools.

Printer-friendly version

Not all infected computers will require full-scale forensic examination by the University Information Security Office. Systems unlikely to contain Level 1 protected data will not require preemptive forensics work, which involves the removal of the physical machine to a separate facility for detailed investigation. For security reasons, we can't go into any further details about what happens after that.

Printer-friendly version

Unfortunately, the weakest link in the information security chain is usually human rather than software driven. Did you share your password with anyone? Have you let someone else use your computer? Do you recall downloading and installing software that looked useful but didn't come through official channels? Any one of these or many other types of behavior can cause or enable a breach in the security of your system. Make sure you follow HSU's Top 10 Security Measures to keep your computer secure.

Printer-friendly version

Not directly, no. The Technology Help Desk cannot legally do hands-on work on equipment that's not owned by the University. However, we can refer you to an appropriately-qualified local service establishment who can take care of the issue for you.

Printer-friendly version

Anyone getting past the protection layers on the HSU network would be able to access all the tools necessary to go on an identity theft spree. That''s not something anyone wants to have to deal with, and it is a federal crime to steal personally-identifiable information.

feedback