Updating...
Skip to main content
Filter your search by category. Current category:
All
All
Knowledge Base
Search the client portal
Search
Sign In
Show Applications Menu
Client Portal
Sign In
Search
Home
Hire Process
Knowledge Base
More Applications
Skip to Knowledge Base content
Search
Articles
Knowledge Base
Information Security
Information Security
Information security, infosec, and cybersecurity are often used interchangeably. These terms refer to the processes and tools used to protect sensitive information and information systems from unauthorized activity. Three key principles of information security are confidentiality, integrity, and availability. Confidentiality prevents disclosure of sensitive information to unauthorized parties. Integrity ensures that data is accurate and reliable. Availability ensures that a system or data is available when it is needed.
The Information Security team is here to help you learn more about the many ways you can protect your technology, your information, and your privacy. Check out our pages for some useful tips and resources on how to keep yourself and the University safe. Remember, information security is everyone's responsibility!
If you have suggestions for additional security tips and resources that you and others may find helpful, please contact InformationSecurity@ferris.edu.
Categories (4)
Email Resources
Encrypting email, quarantine reports, safe senders, junk mail, report suspicious email.
Expand
Security Tips & Resources
Security tips and resources to keep you safe at work and at home.
Expand
Encryption
Disk encryption, email encryption, removable drive encryption.
Expand
IT Policies
Technology related business policies.
Expand
Articles (8)
Pinned Article
What is Information Security?
An overview of information security.
Add Trusted Senders to Safe Senders List in Outlook
How to add safe senders to Outlook.
International Travel With a Ferris Cell Phone
International Travel with a Ferris owned phone.
IT Related Policies, Procedures, Standards, and Guidelines
What you need to know about IT-related policies, procedures, standards, and guidelines.
Lost or Stolen MFA Fob
The steps to get a new MFA fob.
Security Tips & Resources
Stay informed and protect your identity with these tips and resources.
What are Quarantine Reports?
Information about email quarantine reports.
What Constitutes Confidential and Restricted Data
A list of data considered to be confidential and restricted.
Search this category
Search
Blank
Popular Articles
Password Help
Connect to Wireless at Ferris
New Student/Employee Instructions for Account Access
Setting Up MFA For Office 365 Via Authenticator App
Windows Laptop Recommendations
Recent Articles
Account Management Process
Computer Labs and Locations
Security Tips & Resources
Use of Password Managers
The Hire Process
Popular Tags
MFA
(9)
Security
(9)
WiFi
(9)
Network
(8)
Email
(5)
Encryption
(5)
MacAddress
(5)
Access
(4)
Apple
(3)
Hardware
(3)