All computers (Mac, PC, and Linux) are susceptible to viruses, spyware, and malware. That is why it is important to protect your computer from potential viruses by having an antivirus program installed on your computer.
Report computer security incidents and obtain assistance to resolve them. Acts as liaison to law enforcement and university counsel on issues as necessary.
Network scans of computer system(s) to identify active communication paths and potential vulnerabilities.
Technical review and assistance to ensure compliance with security standards for handling credit cards on all campus systems.
ITS, in partnership with Facilities Management and the Department of Public Safety, provides the ability for university organizations to automate electronic door access rights assignment for individuals based upon University affiliation.
This is a collection of resources about encryption for stored information on portable devices, such as laptops, tablets, and externally attached storage. Encryption is a method to protect digital information that relies on scrambling.
A firewall filters incoming Internet traffic while allowing you (and those behind your firewall) to communicate with the Internet.
Provide recommendations for security controls implementation for computing devices.
Various resources and guidance regarding information security.
Department personnel who serve as communication liaison for campus computer security and network issues.
Phishing is an identity-theft scam that uses "spoofed" or fake emails and websites to trick people into giving out personal information, such as credit card numbers, usernames and passwords, or social security numbers. Learn how to stay safe.
Information on how to properly safeguard sensitive research data
Second Level support for Identity Finder software which scans computers to locate files that contain sensitive data such as SSNs, credit card numbers, and passwords.
Perform IT Security evaluations of computer systems and facilities, and provide recommendations to improve security or reach compliance with regulations.
Monthly security seminars, an annual Security Day conference, and more.
Spyware is advertising software that gets installed on your computer without your knowledge. Companies use it to pop up ads on your computer, track your Internet usage, and gather other personal information about you.
Provides resources for assistance with technology-related issues such as harassment and intimidation.
Subsidized TLS certificates for campus servers, which allow for encrypted communications. Most commonly used for HTTPS on web servers.
An application to register computer systems with support contact information, and to indicate the purpose and type of system.
The University of Iowa has implemented video surveillance to protect the safety and property of our community, while avoiding unnecessary intrusions.
A network security scan will test your system or server for vulnerabilities that can be used to compromise a system.