Information Security

Knowledge Base articles related to Information Security

Articles (13)

Pinned Article How To: Manage MFA Account Security Options

This article will walk you through the steps to remove and manage your Multi-Factor Authentication devices.

How To: Configure Authenticator Applications (iOS and Android)

This article will walk you through the steps to set up and configure authenticator applications to meet the Multi-Factor Authentication requirements for FSW system access. These are installed and operated on your iOS or Android device.

How To: Configure Authenticator Extension (Chrome, Edge, Firefox)

This article will walk you through the steps to set up and configure the web browser Authenticator Extension to meet the Multi-Factor Authentication requirements for FSW system access. This is installed and operated on Chrome, Edge, and Firefox browsers.

How To: Configure USB Dongle / Security Key

This article will walk you through the steps to set up and configure the USB Dongle / Security Key to meet the Multi-Factor Authentication requirements for FSW system access. The security key is needed anytime you need to log in to an FSW system and will need to be carried with you. Security key utilizes NFC for mobile device authentication access.

Desktop Security

Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.

File Sharing and Copyright

Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.

FSW Secure Email Encryption

If you must send an email to an outside email address (Not @bucs.fsw.edu or @fsw.edu) that may contain identifiable information. Use FSW Secure to encrypt it before sending.

Passwords

Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.

Scare-ware, Phishing, Email Hoaxes and Urban Legends

Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.

Security Awareness Training and Testing

Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.

Storing Sensitive Data

Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.

Virus Protection, Spyware and Adware

Information Security is Everyone’s Concern. IT Security awareness means understanding the various threats that exist in one's environment and taking reasonable steps to guard against them. Studies show that most breaches of computer security are the result of something a computer user did or failed to do. Be sure to take the time to read all of the materials on this site carefully.