Before we can protect our systems and data, we need to know what we have and where it lives. Identifying assets, vulnerabilities, and risks enables us to make informed security decisions.
Best Practices
- Maintain an up-to-date inventory of university devices and applications using USU’s desktop management tools.
- Use datacensus.usu.edu to classify and track data based on sensitivity and compliance needs.
- Identify vulnerabilities in IT systems through regular asset discovery and risk assessments.
warning sign
Call To Action
Follow the instructions at computers.usu.edu to ensure compliance with USU’s Desktop Management Initiative. This helps track and secure all university-owned devices.
Use datacensus.usu.edu to identify where USU’s data assets reside. Conducting a data census ensures that sensitive information is properly classified and protected.