GSBS IT Resources and Security Michael Valladolid IT Manager BSRB S3.8411
Enroll in Two-Factor Authentication Clear your IDM hold Activates your network and email account and gives you more access See me in person with state issued photo ID I will email your login info and how to setup your password. Enroll in Two-Factor Authentication Login with a password and one other piece of information using your smartphone.
For some of you: Fill out the Information Resources User Acknowledgement Form Find it in your packet Turn in at Station 4 (Check-Out) on Wednesday morning Forms Due Session
Protect Password Data Your Computer Your Connection
Protect Data Confidential Data should NOT be stored on personal devices. Data that can cause harm if lost or stolen. Protected Health Information (PHI) Data “individually identifiable health information that is related to the "past, present or future physical or mental health condition" of a person.” Must be De-Identified. Research Data is sensitive data. Encrypt and Back up important data Phishing and Ransomware
Common vector for data loss
Cloud Storage http://www.uth.tmc.edu/UTH-Share/ All file types Sharing unlimited space
Protect Your Computer Password login Install security updates regularly Update your Anti-Virus Definitions Encrypt it.
Protect Your Connection Wi-Fi: Use the secure access points. Do not use any file/media sharing software – such as bitTorrent, movie site plug-ins. Don’t go past the web filters. Log off
Are You Sure?
Email Us: gsbs.support@uth.tmc.edu http://go.uth.edu/GSBSIT Email Us: gsbs.support@uth.tmc.edu