Security Resources For Faculty and Staff


Table of contents

Compliance

The IT Compliance Team exists to ensure the University of Maryland, College Park is effectively fulfilling their IT Security responsibilities. Our mission is set by the USM IT Security Standards. In simpler words, our objective is to influence others to reduce risks which often can be accomplished by raising awareness. Please take a look at our Compliance page for more information about the Services and Guidance we offer.

Top

Identity Finder

Identity Finder is a tool used to proactively locate sensitive information on university-owned computers so that it can be reviewed and deleted or appropriately secured to prevent unauthorized access.

Top

IT policies and standards

For more information about your IT responsibilities and the acceptable use of the University's Information Technology resources please visit our IT Policies and Standards page.

Top

Multi-Factor Authentication

Multi-Factor Authentication (MFA) is an IT security measure that provides an additional layer of security when logging in or performing transactions online. It achieves this by requiring more than one form of authentication to access computing systems. The forms must fall into at least two of three authentication factor categories -- something you know, something you have, and/or something you are.

Top

Phishing

Phishing is an attempt made by an individual or group to obtain personal information from unsuspecting users by posing as a trusted organization or individual, such as technical support or one's bank. Commonly, this is done through email messages that are specifically crafted to look similar to actual communications sent by the organization or individual, at times even using real company logos and information. Please forward any possible phishing email messages to spam@umd.edu. You may also call the Service Desk at (301) 405-1500 to speak with a customer service agent about the issue. We encourage you to visit our Phishing Attacks Page for more information.

Top

Project NEThics

Project NEThics promotes responsible use of information technology through user education and policy enforcement. For more information, visit our Project NEThics page.

Top

Security incident

The Security Operations Center helps handle and mitigate security incidents when they occur. If you believe you have detected a security incident please report it.

Top

Vulnerability scanning

The DIT's Security and Policy group offers vulnerability scanning and assessment as a service free of charge to departments to identify vulnerabilities and make recommendations to improve the security of departmental IT resources as well as consult on new products and products before they are procured and implemented. We offer scans on both a scheduled and ad-hoc basis for any number of systems that you would like us to scan.

Top

Security tips

Top