Tag: Information Security

National Cyber Security Awareness Month image

MSU celebrates National Cyber Security Awareness Month

Cyber security continues to grow in importance, and we all play a role in today’s highly networked world of systems, information, and technology.

MSU Information Technology helps celebrate National Cyber Security Awareness Month (NCSAM) by promoting safe computing tips and supporting the MSU Security Summit on October 15.

MSU SecureIT

SecureIT is the main safe computing initiative at MSU encouraging safe personal computing, as well as information security guidelines and best practices for dealing with institutional data. Read Full Article →


SecureIT site provides information security guidelines to MSU community

The SecureIT site recently launched to provide the MSU community with one place for guidelines and best practices on information security.

MSU employees first used the site as part of the two-factor authentication rollout in March and April 2015.

The site also includes personal safe computing information, ways to safeguard your devices, phishing precautions, password tips, and illegal file sharing details. Read Full Article →


MSU to roll out two-factor authentication starting March 16

Over the next six weeks, Michigan State University is adding steps to safeguard personal and institutional data by applying two-factor authentication to human resources, payroll, and finance systems that are part of our Enterprise Business Systems (EBS).

Once two-factor authentication is implemented for EBS, it will be expanded to additional MSU applications. Read Full Article →


MSU to rollout two-factor authentication in the spring of 2015

Cyber attacks on computer systems and networks to obtain personal information and other confidential data take place on a daily basis.

To maintain the integrity and security of our institution’s data, Michigan State University is taking steps to increase the level of protection in systems amassing sensitive and personal information by implementing two-factor authentication in spring 2015. Read Full Article →