All computers (Mac, PC, and Linux) are susceptible to viruses, spyware, and malware. That is why it is important to protect your computer from potential viruses by having an antivirus program installed on your computer.
Report computer security incidents and obtain assistance to resolve them. Acts as liaison to law enforcement and university counsel on issues as necessary.
Network scans of computer system(s) to identify active communication paths, and potential vulnerabilities.
Technical analysis and assistance to ensure compliance with security standards for handling credit cards on all campus systems.
ITS, in partnership with Facilities Management and the Department of Public Safety, provides the ability for university organizations to automate electronic door access rights assignment for individuals based upon University affiliation.
Provide recommendations for security controls implementation for computing devices.
Various resources and guidance regarding information security.
Department personnel who serve as communication liaison for campus computer security and network issues.
Phishing is an identity-theft scam that uses "spoofed" or fake emails and websites to trick people into giving out personal information, such as credit card numbers, usernames and passwords, or social security numbers. Learn how to stay safe.
Information on how to properly safeguard sensitive research data
Second Level support for Identity Finder software which scans computers to locate files that contain sensitive data such as SSNs, credit card numbers, and passwords.
Perform IT Security evaluations of computer systems and facilities, and provide recommendations to improve security or reach compliance with regulations.
Monthly security seminars, an annual Security Day conference, and more.
Provides resources for assistance with technology-related issues such as harassment and intimidation.
Subsidized TLS certificates for campus servers, which allow for encrypted communications. Most commonly used for HTTPS on web servers.
An application to register computer systems with support contact information, and to indicate the purpose and type of system.
The University of Iowa has implemented video surveillance to protect the safety and property of our community, while avoiding unnecessary intrusions.
Web application vulnerability scanning