Two-factor authentication is used as a security measure to safeguard personal and institutional data. This form of authentication pairs something an individual has (e.g., a security credential) with something known (e.g., a password). Learn more about Two-Factor Authentication.
MSU Information Security oversees the process of removing sources of any technology incident, collecting evidence, addressing vulnerabilities, wiping any compromised data stores, and resuming business operations as soon as possible. Read more about Incident Response.
Information Security cyclically tests select MSU systems for vulnerabilities and will continue on an ongoing basis to identify, classify, remediable, and mitigate vulnerabilities (especially in software and firmware) for computer and network security. Read more about Vulnerability Management
MSU funds several security licenses that the MSU community can use including: