Archive for the ‘security’ Category

Windows Workstation Patches 4/13

April 12, 2013 Comments off

Windows workstation patches will be released on 4/13. Some of these patches may require your workstation to reboot. Please be sure that you save all work and log out of your workstation before you leave for the weekend.

If you have any questions, please contact the Service Desk at x4-1950.

Categories: security, software update

Protect Personal Information with Identity Finder

March 17, 2011 Comments off

Identity Finder screenshotIdentity Finder is a tool designed to protect your personal data, such as credit card numbers, passwords, birth date, social security number, bank account numbers and even telephone numbers. It does this by looking for sensitive information on your computer and on our network.

We suggest you take a few moments this semester to run this program. Most of us will be surprised at how much of our personal information is sitting on our office computers, S drive and T drive folders.

Please load the Wizard and follow the instructions on screen. Identity Finder will ask you if you would like to encrypt or shred each file that contains the personal data that you were searching for. If you know you won’t need it again just shred the sensitive data and there will be a lessened risk in case your account is compromised.

Read our guide that further explains Identity Finder

Categories: faculty/staff, security

Public Service Announcement – Cyber Security

October 12, 2010 Comments off

Cyber Security Awareness sessions are scheduled for the the entire month of October. Please join us.

Up this week:

  • Laptop and Travel Preparation for faculty and staff on 10/12/10 at 4pm in Olson Auditorium (AB4, 220).
  • Copyright Infringement for students on 10/13/10 at 2pm in Olson Auditorium (AB4, 220).
Categories: security

Public Service Announcement – Peer-to-Peer Software

June 4, 2010 Comments off

Peer-to-peer (P2P) software allows for the sharing of files across the Internet between people that have the same software installed. Some examples of this type of software are: Limewire, Kazaa, and Bittorrent. There are many security issues with installing these sorts of programs.

  1. If the software is not installed or setup correctly you may be sharing files and information stored on your computer that you were not intending to share. This could include bank and credit card information.
  2. Depending on the type of file-sharing you are engaging in, it could be illegal. If caught, you could face a lawsuit for copyright infringement for distributing copyrighted music, tv shows, and movies. If using a network other than your own, you could lose your account access on that network (ie. your school or work computer account will be disabled).
  3. You could be downloading spyware and viruses.

This is a reminder to please be aware of what you are doing online and minimize your risks.

Categories: PSA, security

Public Service Announcement – Phishing

May 28, 2010 Comments off

This video received Honorable Mention in the 2009 Computer Security Awareness Poster & Video Contest.

DNS Changes 5/28/2010

May 28, 2010 Comments off

Over the summer and fall semesters, our Systems Team will be making some changes to the DNS Infrastructure used on campus. These changes will add additional redundancy, scalability and security to our DNS servers, and should be transparent to all managed Windows and Mac workstations.

For those using unmanaged workstations on campus, you’ll need to change your DNS servers from and to and After Fall 2010, the legacy DNS server ( and will not resolve any internal SHSU domains (file and print servers, domain controllers, etc) or any external domain (,,, etc).

Copier Data Security

May 12, 2010 Comments off

Many of you may have seen the CBS News report about copier machines retaining images of all documents scanned, copied, or faxed to them. To combat this very issue, SHSU has updated their contracts on leased equipment to include data confidentiality. Computer Services also works with the Property Office to ensure that all data is cleaned from copiers, fax machines, and computers before the equipment is redistributed on campus or is sold in auction.

Categories: security

Get every new post delivered to your Inbox.

Join 429 other followers