PROTECT

How might we safeguard our IT assets from cyber threats while enabling academic freedom and productivity?

Protection measures help ensure that IT systems remain secure and accessible for their intended use. Security controls like endpoint protection, encryption, firewalls, and vigilant users reduce risks.

Best Practices

  • Keep all devices updated with the latest security patches.
  • Ensure Crowdstrike Endpoint Detection & Response (EDR) is active on all university-owned systems.
  • Use firewalls and secure network configurations to prevent unauthorized access.
  • Encrypt sensitive data at rest and in transit.
  • Report suspicious activity immediately to IT security.
warning sign

Call To Action

Follow the instructions at computers.usu.edu to ensure compliance with USU’s Desktop Management Initiative.

Work with your IT support team at mytech.usu.edu to verify that your desktop is properly managed and configured for security.

Use GlobalProtect VPN when accessing university resources remotely to ensure secure connections.

Adopt a skeptical and empowered mindset—always question unexpected emails, links, and requests for information.

Key Questions Answered

Why is endpoint protection required?

Endpoint protection provides real-time response to malicious activity and helps keep USU devices and your account safe.

How does the Desktop Management Initiative protect university devices and data?

Device Management provides many security benefits while also ensuring compliance with applicable state and federal requirements. See computers.usu.edu for more information.

Why should I use the GlobalProtect VPN?

Using the VPN secures your connection to USU’s network, protecting sensitive data from interception and giving you access to campus-only resources. Use the GlobalProtect VPN whenever you are off-campus for any official USU business

Available Tools & Resources

  • computers.usu.edu - Ensures proper desktop management for security compliance.

  • mytech.usu.edu - IT support for implementing security configurations.

  • Crowdstrike – Protects against malware, ransomware, and other advanced threats.

  • Firewalls – Prevent unauthorized access to university networks and systems.

  • GlobalProtect VPN – Secures connections when working remotely.

  • A skeptical and empowered user base – Your awareness is the first line of defense against cyber threats.