OCIO released a new mobile email solution, Outlook Mobile for iOS and Android, on Friday, June 21. This mobile application provides security protections, while smoothly integrating with Microsoft Office 365 applications.
When using any of Ohio States online eApplications systems (eTravel, eRequest, HR Action, etc.) that allow for the attachment of files, it is important to remember to remove any restricted data from the attachments.
Restricted data requires the highest level of protection due to legal, regulatory, administrative, contractual, rule or policy requirements . Access to and management of restricted data is strictly limited as unauthorized use or disclosure could substantially ormaterially impact the university's mission, operations, reputation, finances or result in identity theft.
Restricted data includes items such as Social Security Numbers, medical information and full credit card numbers. Restricted data elements should NEVER be included in any attachment.
The Information Security Executive® (ISE®) awards program recently recognized Chief Information Security Officer Helen Patton as ISE® North American Executive of the Year in the Academic/Public division. She was honored during the ISE® North America Leadership Summit and Awards held in Chicago...
Ohio State is expanding its use of multi-factor authentication in order to increase the level of protection that prevents unauthorized individuals from accessing your information. Adding BuckeyePass to the login process for the Carmen...
Phishing risks have increased exponentially in recent years, and Ohio State is taking a number of steps to ensure our users know how to spot a fake email and how to respond. Educating all of our email users is the key. We've even sent faux phishing messages as an educational opportunity for...
Cyber criminals are naturally drawn to money -- your money. Financial aid awarded to students is a frequent target. This is a challenge for the university, as we often need to contact you about financial aid for legitimate reasons. It is important to recognize the difference between a valid...
Tax related phishing attempts frequently occur, because criminals would love to get their hands on your W-2 so they can steal your identity and/or your tax refund. This article (new for 2018 tax season) is posted to share with you what you should expect. The image posted with this article is an...
Wrapping up the summer with a last-call vacation? What would you do if your phone decides to make a splash when you are poolside? There’s nothing worse than losing all your data – photos, contacts and lists – because your device is hacked, lost, stolen or destroyed. Back up your assets for a...
When using any of Ohio States online eApplications systems (eTravel, eRequest, HR Action, etc.) that allow for the attachment of files, it is important to remember to remove any restricted data from the attachments.
Restricted data requires the highest level of protection due tolegal,...