Protection measures help ensure that IT systems remain secure and accessible for their intended use. Security controls like endpoint protection, encryption, firewalls, and vigilant users reduce risks.
Best Practices
- Keep all devices updated with the latest security patches.
- Ensure Crowdstrike Endpoint Detection & Response (EDR) is active on all university-owned systems.
- Use firewalls and secure network configurations to prevent unauthorized access.
- Encrypt sensitive data at rest and in transit.
- Report suspicious activity immediately to IT security.
warning sign
Call To Action
Follow the instructions at computers.usu.edu to ensure compliance with USU’s Desktop Management Initiative.
Work with your IT support team at mytech.usu.edu to verify that your desktop is properly managed and configured for security.
Use GlobalProtect VPN when accessing university resources remotely to ensure secure connections.
Adopt a skeptical and empowered mindset—always question unexpected emails, links, and requests for information.