Find help with Computer Security

The security of all machines and data on the ATSU network depends on every account and machine being secure and free of malware such as viruses, worms and spyware. A single insecure account or machine can cause a major security incident or cause a virus attack to be propagated. Many computer security incidents are preventable by a combination of keeping machines up to date, utilizing ATSU provided anti-virus protection and having strong passwords on all accounts in addition to safe browsing habits.

We know computing security can be a bewildering and confusing topic. The ITS department is committed to helping faculty, staff and students to protect their computers and information.

However, it is important that the entire ATSU community work to make sure that ATSU’s computing resources are safe and secure. The information on this page will help guide you in being a safe computer user.

Remember that many mobile devices have the power and functionality of a computer.

ATSU computer & network use guidelines

· ·

ATSU’s computer-related resources (i.e. hardware, software, and various network connections, etc.) exist to support activities consistent with the campuses’ mission in education, instruction, research, administration, and community service. ATSU provides faculty, staff and students with access to modern information technology to support the pursuit of excellence in these areas. Use…

Read more

What you need to know about peer-peer file sharing (P2P)

· · · ·

Peer-peer (P2P) file sharing is a method of transferring files between individual computers via the Internet. While this technology is fairly generic, it has come to be the method of choice for illegally distributing copyrighted works like music, movies and software. Additionally, it is an open door for the distribution…

Read more

Data Security on Copy Machines

When considering the purchase of a copy machine, please follow best practice and work with the Purchasing department for optimal prices and services. Additionally, appropriate contract approval should be verified with the ATSU General Counsel’s office. Once a copier is purchased/leased, please contact the ITS department to coordinate with the…

Read more

Browser Updates

Software updates are an important part of computer security. In the same way that anti-virus software protects your system from threats of viruses, mal-ware, and spyware, software updates to your operating system, applications, and browsers provide important performance enhancements and security upgrades. As we all know, browsers are becoming one…

Read more

SPAM Filtering

· ·

Spam and suspicious emails Spam is usually considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. Gmail automatically helps identify spam and suspicious emails by detecting viruses, finding patterns across messages, and learning from what Gmail users like you…

Read more

Firewalls at ATSU

What is a firewall? A firewall is a barrier that keeps “the bad guys” out of a network or computer by following a set of rules to filter the information entering and exiting a network, or computer, allowing or denying access to each specific request. Like the physical wall that…

Read more

Malware protection

· ·

What is malware? Malware is an abbreviated term used to describe a “malicious software” program. Malware includes viruses, trojans, worms, keyloggers spyware or adware programs, that will perform such tasks as tracking cookies, which are then used to monitor your surfing habits. You hear about many different forms of electronic…

Read more

Virus Protection

What is a Computer Virus? A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or…

Read more

Data storage and protection

·

ATSU has legal and ethical obligations to ensure that data is managed in a manner that maximizes its use and is strongly committed to maintaining the privacy and security of confidential personal information and other highly sensitive materials. Access to information is granted to a particular individual based on the…

Read more