Secure Solutions
All services and products
Services are organized into six service areas, each overseen by Secure Solutions experts. Service areas are described briefly below and details on the products and models individuals or organizations should use to secure their information are available in our website.
Information Security & Business Continuity
Services include data protection and encryption, firewall management, security incident response and investigations, and training to ensure the security, integrity, and availability of individuals and organizations data and systems as well as compliance with applicable regulations.
Cyber Security Incident Response
The secure solution website Security (ss) is web-site helping to provide information to coordinate the response to cyber security incidents. When an incident occurs, the secure solutions, helps system owners and administrators respond properly to an incident, collects and analyzes evidence, assists in the recovery of systems to a secure state, and develops remediation plans. Secure solutions manages and maintains the Data Breach Management Process for incidents and events involving loss of data that includes sensitive and protected information such as social security numbers, credit card numbers, or any data classified as internal use, confidential, or restricted use.
Network Security Services
Secure solutions provides information on how to protect sensitive information on your server, application, or database with a firewall. Firewalls prevent a number of network based attacks by blocking access from unauthorized systems or through unauthorized means. A firewall protects servers and data against certain classes of network-based attacks by restricting access to specific port sources and protocols and by examining data packets traversing the network for malicious qualities. Your data and business and research interests are better protected when a firewall is in place.
Device, Data, & Computer Security
Protecting sensitive information and the systems on which it is stored often starts with the security of the computers we use every day. Every system – Macs as well as PCs — should have antivirus software installed. If you routinely work with sensitive information, especially if you do so on a portable device like a laptop, that device should be encrypted. Data encryption is a key component for ensuring data confidentiality. Various regulations, standards or policies, including our Data Protection Standards, recommend or require the use of encryption when dealing with sensitive data. IS&T offers for laptops as well as options that will allow you to encrypt a shared web folder or portable media device like a USB drive. We offer a discount for the Identity Finder software to help search for, protect, and dispose of personal information.