Get Help

Online: Request Help
Phone: (707) 826-HELP (4357)
Email: help@humboldt [dot] edu
In Person: Library 120 • Hours
Reset HSU Password
System Status

Services For

Search

Search results
Security :: Identity Finder for Mac

... You Start Identity Finder uses a non-standard encryption method with limited recovery options that could result in data ... Secure function. It uses an unsupported, nonstandard encryption method and you may lose your data. (Data Protection, ...

Page - Anonymous - Jan 16 2013 - 3:19pm - 0 comments - 0 attachments

Security :: Identity Finder for Windows

... You Start Identity Finder uses a non-standard encryption method with limited recovery options that could result in data ... Secure function. It uses an unsupported, nonstandard encryption method and you may lose your data.   (Data Protection) ...

Page - rrw1 - Aug 15 2011 - 4:56pm - 0 comments - 0 attachments

Security :: Identity Finder for Windows

... You Start Identity Finder uses a non-standard encryption method with limited recovery options that could result in data ... Secure function. It uses an unsupported, nonstandard encryption method and you may lose your data.   (Data Protection, ...

Page - bjt7001 - Jan 16 2013 - 3:14pm - 0 comments - 0 attachments

Security :: Security Resources for ITS Support Staff

... Securing protected information HSU mandates encryption of all protected information stored on University-owned devices. Encryption is one of those areas where things can go irretrievably wrong very ...

Page - rrw1 - Dec 17 2013 - 10:45am - 0 comments - 0 attachments

Can I encrypt my my hard drive myself?

We wouldn't advise it. Encryption is a complex process that involves scrambling data in such a way ... with a special key that you create as part of the encryption process. If you lose that key, your data is likely gone for good. An experienced computer technician can handle the encryption and ensure that there is fall-back way to access your data if you ...

FAQ - Anonymous - Sep 12 2011 - 10:50am - 0 comments - 0 attachments

Security :: Protected Information Scan

... necessary for conducting essential university business, encryption may be a solution, Encryption should not be used without consultation with your ITC . ...

Page - rrw1 - Sep 25 2012 - 12:03pm - 0 comments - 0 attachments

Security :: Hardware Personal Information Protection

... stored on a computer is to encrypt it. However, encryption can reduce performance on the computer and increase the ... “ Password Protection .” 3. The same encryption approaches can be used to protect personally identifiable or other ...

Page - rrw1 - Jul 13 2011 - 2:36pm - 0 comments - 0 attachments

What are the requirements for storage of Level 1 data?

... implemented to protect the data. Campuses must use encryption , or equally effective measures, on all mobile devices that store ... in the CSU Data Classification Standard. Alternatives to encryption must be reviewed on a case-by-case basis and approved in writing by ...

FAQ - Anonymous - Jul 26 2013 - 12:22pm - 0 comments - 0 attachments

Security :: Tools and Resources

... in hardware, software, or a combination of both. Encryption . Encryption converts data into a secure form that can be safely moved around ...

Page - bjt7001 - Apr 24 2013 - 1:22pm - 0 comments - 0 attachments

Secure Wireless :: How to Connect :: HSU-Owned Windows 7/Vista Systems

... for Security type. Select AES for Encryption type. Check Start this connection automatically . ... WPA2-Enterprise for Security type. Select AES for Encryption type. Select Microsoft: Protected EAP (PEAP) as the ...

Page - Anonymous - Dec 17 2013 - 1:27pm - 0 comments - 0 attachments

feedback