Security Awareness and Information

Troy University Cyber Security works with campus divisions to identify, deter and thwart attacks on campus IT resources and data. We endeavor to educate users about cyber threats, and ensure compliance with information security laws and policies. We invite you to review our resources and to offer feedback for improvement. Your participation in our efforts will foster greater success in protecting Troy’s resources.

Click Here for a flyer about National Cyber Security Awareness Month.

October is National Cyber Security Awareness Month

WEEK 1: OCTOBER 10-14 | This Phishing Isn't Much Fun - Don't Get Hooked
WEEK 2: OCTOBER 17-21 | Two Steps Ahead Campaign
WEEK 3: OCTOBER 24-28 | Internet of Things

WEEK 4: OCTOBER 31 | Cyber Security Month Wrap-Up

 

On Wednesday, October 19th, visit the Civic Room at Trojan Dining on the Troy Campus from 2:00 pm - 3:30 pm to explore the vast array of protective services available from TROY IT. View the flyer to learn more.

 


Phishing

Don't Get Hooked! - View this poster to learn more about what phishing is, why it is dangerous and how to recognize it.

Phishing Examples - Visit this page to view examples of phishing messages sent to University students and employes.

Password Management

Passwords are an important part of computer security at Troy University. They often serve as the first line of defense in preventing unauthorized access to university computers and data. Because of this, it is important to choose passwords that are complex enough to prevent others from guessing them. It is also important to keep passwords secure so they cannot be seen by others.

These standards are intended to provide information and guidance about how to create good, ambiguous passwords and how to keep them secure and confidential.

Screen Locking Standard

Physical Security

Securing your computer equipment

  • Use strong passwords or pass phases
  • Do not share your username and password with anyone
  • Do not tape your username and password to anything in your office
  • Lock down workstations and laptops
  • Secure your area when leaving
  • Don't leave computers or other electronic devices visible in a vehicle or in a hotel room while traveling
  • Don’t leave sensitive information lying around unprotected, including on printers or copiers

Use extra security measures for portable devices (including laptop computers) and portable electronic media containing university info:

  • Encryption
  • Extra physical security; security cables, cases, etc.
  • Portable devices and media should never house Personally Identifiable Information (PII)

Theft of Computer Equipment

Report suspected theft of Troy University computer equipment to the University Police at 334-670-3215 and the IT Department at 334-670-HELP (4357).

Be sure to let the IT department know if the stolen equipment contains any sensitive information. Local authorities should also be contacted if the incident occurs away from campus.

Learn more about FrontDoor Software

Troy University, Troy, Alabama 36082 | 1-800-414-5756 | Questions? | Submit Feedback
Privacy Statement | Read Our Disclaimer | Accreditation Statement
© 2016 Troy University