IT Security Topics
![]() |
PasswordsWhat You'll Find: Tips and Best Practices for Creating and Using Unique and Strong Passwords |
![]() |
PhishingWhat You'll Find: What is Phishing? | Ways to Protect Yourself and KU |
![]() |
KU PoliciesWhat You'll Find: Security- and Technology-related Policies at KU | Data Classification Policy | Email Policy |
![]() |
Protecting KU DataWhat You'll Find: Tips and Best Practices for Protecting KU Data | KU Data Classification Policy |
![]() |
Antivirus SoftwareWhat You'll Find: Sophos at KU and for Home Use |
![]() |
Email SecurityWhat You'll Find: Email Encryption and Digital Signatures |
![]() |
EncryptionWhat You'll Find: Whole Disc Encryption | Email Encryption | International Travel and Encryption |
![]() |
Working Off CampusWhat You'll Find: Tips and Best Practices to Stay Safe When Working Off Campus |
![]() |
TravelWhat You'll Find: Security Travel Tips and Best Practices | International Travel with Encrypted Devices |
![]() |
ConsultingWhat You'll Find: KU IT Security Office Consultations for KU Departments |
![]() |
Firewall ManagementWhat You'll Find: KU IT's Firewall Management Service |
![]() |
Research Security SupportWhat You'll Find: Security Information and Resources for Research at KU |
![]() |
Public Wi-FiWhat You'll Find: Tips and Best Practices to Stay Safe on Public Wi-Fi Networks |
![]() |
MalwareWhat You'll Find: What is Malware? | Tips and Best Practices to Avoid Malware |
![]() |
Internet SecurityWhat You'll Find: Tips and Best Practices to Stay Safe While Online |
![]() |
Mobile SecurityWhat You'll Find: Tips and Best Practices to Stay Safe While Using Laptops, Phones and Tablets |
![]() |
Social NetworkingWhat You'll Find: Tips and Best Practices to Stay Safe While Using Social Media |
![]() |
Multifactor AuthenticationWhat You'll Find: Help Improve System and Onlilne Security with Multifactor Authentication |
![]() |
eWaste RecyclingWhat You'll Find: KU IT's eWaste Recycling Program |