- Safe Computing/Buckeye Secure
Information on general security topics, such as spam, identity theft, and how to protect your computer.
- Information Risk Management Program
Details about the OSU Information Risk Management Program.
- Information Security Groups
Information regarding security-related groups, including current membership and how to join a group.
- IT Security Framework
Details about recommended controls, including simple checklists and tools for network administrators and IT security professionals.
- FY15 Year In Review (requires authentication)
Summarizes the FY15 accomplishments under the purview of Ohio State's Chief Information Security Officer.
Online training opportunities related to data security.
IT Security News
In the course of your work for The Ohio State University, you will be given access to many types of information about university business and research, which is referred to as institutional data. As an institutional data user, you must be aware of the responsibilities entrusted to you in preserving the security and confidentiality of this information, as outlined in the Institutional Data policy (IDP).
Ray Bradbury predicted it back in 1950 in his short story “There Will Come Soft Rains”—household appliances and devices being set to automatically make breakfast, clean the house, open the garage door and more. In 2016, 10 years ahead of Bradbury’s scenario, we’re already entering this world thanks to the Internet of Things.
Sometimes you can just tell something is up with your computer: your passwords no longer work, programs are turning on randomly, your friends question your latest “business opportunity,” the list goes on. You dread what these signs could mean—you’ve been hacked. But don’t panic. You need to act fast to shake off the bad situation before it gets worse.