Multifactor authentication, phishing, firewall, SSL certification, encryption, and more.
This article provides FAQs about BitLocker Drive Encryption at Wayne State, including who receives it, how it protects data, how to check if it’s enabled, and what to do in case of issues or a lost/stolen device.
This article explains how Wayne State users can report phishing or scam emails in Outlook (web, mobile, or desktop). Reported emails are flagged to the security team and removed from the inbox.
Information on how to request a change to firewall
This article outlines the legal and university-related consequences of illegally sharing copyrighted content, explains how violators are identified, and encourages the use of legal alternatives for downloading media.
This article provides tips on how to create a strong password and why it matters. It also links to Wayne State’s official password rules so you know exactly what’s required.
This article summarizes how to lock your computers on Windows and Mac.
This article provides general information on how to create strong passwords to help protect your computer.
This article outlines immediate steps to take if your Wayne State account or personal information is compromised, including changing your password, contacting the C&IT Help Desk, and placing a fraud alert with credit bureaus to protect against identity theft.
Reporting security incidents.
Securing encryption on a USB flash drive
This article outlines the responsibilities of Wayne State’s Information Security Office, including incident response, enterprise system access, two-factor authentication, VPN usage, identity management, and network security services such as firewall management, SSL certificates, vulnerability scanning, and security reviews.
This article provides links to key federal and state legislation related to IT security and data privacy, including FERPA, HIPAA, GLBA, and more.
This article outlines key security settings for iOS devices, including passcodes, Touch ID, Lost Mode, and safe app practices.
This article offers tips for keeping your mobile device secure, including using built-in security features, remote tracking tools, physical safety practices, recommended security apps, and connecting to the WSU-SECURE wireless network.
This article explains Security Access Management, including how users gain access to enterprise applications like Banner and Cognos, where to find request forms and documentation, and how to get support.
This article outlines key security settings available on Android devices, including screen locks, fingerprint scanners, Smart Lock, remote management tools, and best practices for app safety.
Setting up and using LassPass
This article explains what to do if your files or browser are suddenly locked due to a potential ransomware attack.
Remote campus connection VPN tool
Provides link to WSU It security policies
Wayne State VPN (Global Protect)
This article provides an overview of the C&IT Security Awareness Program at Wayne State, including how to access the training, enable pop-ups, receive certification, and find additional security resources.
This article explains what a data breach is, how it can occur, its potential impact, and what steps to take if you suspect a breach involving Wayne State University data.
This article explains what a firewall is and why it is important for protecting your computer or network from malicious threats. It also provides guidance on enabling built-in firewalls on Windows and macOS and directs users to the C&IT Help Desk for additional support.
This article explains how Wayne State University’s email quarantine works as a security feature to protect against phishing and harmful messages. It covers how users are notified of quarantined emails, how to review them, and how to release safe messages or block harmful ones. It also includes instructions for marking senders as safe in Outlook.
This article introduces Wayne State's Information Security Office (ISO), its role in protecting university IT systems, and how to report security incidents or concerns.