Skip to main content Skip to main navigation Skip to footer content

Information Security

Services

Anti-Phishing Training

Anti-phishing training educates staff and faculty on how to recognize and avoid phishing attempts, helping to prevent unauthorized access and data breaches.
Learn to Spot Phishing Attempts

Anti-Virus

Anti-virus protection is software designed to detect, block, and remove malicious programs like viruses, malware, and ransomware from your computer or device.
Protect Your Device from Malware

Employee Offboarding

Employee offboarding is the process of managing a staff or faculty member's access to campus resources as they transition out of the university
Securely Manage Employee Transitions

 

Endpoint detection and response (EDR)

A cybersecurity solution designed to detect, investigate, and respond to advanced threats on endpoints that access sensitive data.
Explore Advanced Endpoint Protection

Firewall Security

A firewall policy is a set of rules that controls network traffic to protect systems by allowing trusted access and blocking potential threats.
Learn About Network Protection Policies

Globalprotect VPN

A Virtual Private Network (VPN) is a service that creates a safe and private connection online.
Access Campus Resources Remotely

 

Multi-Factor Authentication

Multi-factor authentication enhances your account security by requiring an additional verification step, such as using your phone, in addition to your password.
Strengthen Your Account Security

PeopleSoft Security

PeopleSoft Security focuses on safeguarding data and controlling access in Oracle’s PeopleSoft applications, which are often used for managing tasks such as human resources and financial operations.
Control Access to Sensitive Data

Phishing Awareness & Education

Educating and informing staff, faculty and students about phishing attacks, where attackers attempt to trick individuals into providing sensitive information.
Stay Informed About Phishing Risks

 

Procure to Pay (P2P) Security

Assign employees the necessary security role to access the CSU Procure-to-Pay system.
Manage Secure Access to P2P System

Third-Party Risk Assessment

The IT Security Office conducts a risk assessment of third-parties before purchasing software or granting third-party access.
Evaluate Third-Party Risks

Risk Assessments

Campus risk assessments are evaluations conducted to identify and analyze potential risks or vulnerabilities that could impact the university.
Identify & Manage Campus Risks

 

Threat Detection and Identification

The process of identifying, investigating, and mitigating cyber threats in real time to prevent or minimize damage to the university's systems and data.
Monitor and Respond to Cyber Threats

Vulnerability Management

Vulnerability management involves the ongoing detection and remediation of security flaws in computers and systems using specialized tools.
Detect & Remediate System Vulnerabilities