Security

Security, data integrity and compliance for institutional activities

Articles (47)

CrowdStrike Falcon Endpoint Protection

CrowdStrike Falcon provides enhanced endpoint protection to laptops, desktops, and servers owned by the University of Delaware. CrowdStrike Falcon software installed on these systems is managed by IT Professionals within each unit in partnership with UD Information Technologies.

Email Phishing Controls

To identify emails that may be spoofed or possible phishing attempts, UD Information Technologies is using both a feature in Gmail and an email phishing service for Exchange that will mark suspicious incoming email messages with warning banners. This article covers what to do with those messages and options for resolving warnings if your own messages are being marked.

Phish Alert Button (PAB): how to use it to report phishing emails

The Phish Alert Button (PAB) that allows you to report a potential phishing email via your Outlook desktop/web/mobile application or Gmail/Gmail mobile application. Using the PAB will alert the IT Security department to review the email and take immediate action.

Process for Purchasing Electronic & Information Technology (EIT) at UD

You must complete the following steps to ensure the University's accessibility and data security requirements are met before purchasing new technology or renewing existing technology contracts.

Updating macOS

How to update macOS