Find help with Computer Security
The security of all machines and data on the ATSU network depends on every account and machine being secure and free of malware such as viruses, worms and spyware. A single insecure account or machine can cause a major security incident or cause a virus attack to be propagated. Many computer security incidents are preventable by a combination of keeping machines up to date, utilizing ATSU provided anti-virus protection and having strong passwords on all accounts in addition to safe browsing habits.
We know computing security can be a bewildering and confusing topic. The ITS department is committed to helping faculty, staff and students to protect their computers and information.
However, it is important that the entire ATSU community work to make sure that ATSU’s computing resources are safe and secure. The information on this page will help guide you in being a safe computer user.
Remember that many mobile devices have the power and functionality of a computer.
Multi-Factor Authentication (MFA)
Computer Security · Faculty & Staff ResourcesATSU now requires that users be enrolled in multi-factor authentication. If you are not currently enrolled in MFA and would like to be, you may request it by putting in a service ticket. Following is information about MFA. What is MFA? MFA requires you to have a second means of... Read More
Access your ATSU files remotely
Computer Security · Faculty & Staff ResourcesAccessing your files Google Drive & File Stream are tools to store your files in the cloud and maintain the ability to access them from any device with an Internet connection. These tools will still allow you to use the applications you know and love, while improving your file accessibility... Read More
Malware, Phishing & Viruses
Computer SecurityWhat should I do if I suspect my account or machine has been targeted by malware? If you have received a suspicious email, such as a phishing attempt, simply click on the Phish Alert Button (phishhook icon) at the top of your email or forward the email to reportabuse@atsu.edu.... Read More
Updating your computer’s operating system
Apple · Computer Hardware · Computer Security · Student ResourcesWindows To update your Windows 7 and 8 Operating System: Open Windows Update by clicking the Start button. In the search box, type Update, and then, in the list of results, click Windows Update. Click Check for updates, and then wait while Windows looks for the latest updates for your... Read More
ATSU computer & network use guidelines
Computer Hardware · Computer Security · Network TechnologiesATSU’s computer-related resources (i.e. hardware, software, and various network connections, etc.) exist to support activities consistent with the campuses’ mission in education, instruction, research, administration, and community service. ATSU provides faculty, staff and students with access to modern information technology to support the pursuit of excellence in these areas. Use... Read More
What you need to know about peer-peer file sharing (P2P)
Computer Security · Computer Software · Faculty & Staff Resources · Peer-Peer File Sharing · Student ResourcesPeer-peer (P2P) file sharing is a method of transferring files between individual computers via the Internet. While this technology is fairly generic, it has come to be the method of choice for illegally distributing copyrighted works like music, movies and software. Additionally, it is an open door for the distribution... Read More
How to change your (passphrase) password
Computer Security · Faculty & Staff Resources · Faculty Orientation · Student Orientation · Student ResourcesATSU-ITS recommends the use of passphrases What is a passphrase? A passphrase is a sentence-like string of words used for authentication that is longer than a traditional password, easy to remember and difficult to crack. Typical passwords range from 8-16 characters on average while passphrases can reach up to 100 characters in... Read More
Data Security on Copy Machines
Computer SecurityWhen considering the purchase of a copy machine, please follow best practice and work with the Purchasing department for optimal prices and services. Additionally, appropriate contract approval should be verified with the ATSU General Counsel’s office. Once a copier is purchased/leased, please contact the ITS department to coordinate with the... Read More
Browser Updates
Computer SecuritySoftware updates are an important part of computer security. In the same way that anti-virus software protects your system from threats of viruses, mal-ware, and spyware, software updates to your operating system, applications, and browsers provide important performance enhancements and security upgrades. As we all know, browsers are becoming one... Read More
SPAM Filtering
Computer Security · Email · GmailSpam and suspicious emails Spam is usually considered to be electronic junk mail or junk newsgroup postings. Some people define spam even more generally as any unsolicited email. Gmail automatically helps identify spam and suspicious emails by detecting viruses, finding patterns across messages, and learning from what Gmail users like you... Read More
Firewalls at ATSU
Computer SecurityWhat is a firewall? A firewall is a barrier that keeps “the bad guys” out of a network or computer by following a set of rules to filter the information entering and exiting a network, or computer, allowing or denying access to each specific request. Like the physical wall that... Read More
Malware protection
Computer Security · Faculty & Staff Resources · Virus ProtectionWhat is malware? Malware is an abbreviated term used to describe a “malicious software” program. Malware includes viruses, trojans, worms, keyloggers spyware or adware programs, that will perform such tasks as tracking cookies, which are then used to monitor your surfing habits. You hear about many different forms of electronic... Read More
Virus Protection
Computer SecurityWhat is a Computer Virus? A computer virus is a small software program that spreads from one computer to another computer and that interferes with computer operation. A computer virus may corrupt or delete data on a computer, use an e-mail program to spread the virus to other computers, or... Read More
Data storage and protection
Computer Hardware · Computer SecurityATSU has legal and ethical obligations to ensure that data is managed in a manner that maximizes its use and is strongly committed to maintaining the privacy and security of confidential personal information and other highly sensitive materials. Access to information is granted to a particular individual based on the... Read More